pokkst@monero.towntoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Do you use an anonymous network for downloading?English
02·
1 year agoYeah I seed some printable firearms files torrents over I2P, and seed other stuff I find on tracker2.postman.i2p
Tor link for XMR wallet and firearms: http://rk63tc3isr7so7ubl6q7kdxzzws7a7t6s467lbtw2ru3cwy6zu6w4jad.onion/
Git: git.mynero.i2p
87BqQYkugEzh6Tuyotm2uc3DzJzKM6MuZaC161e6u1TsQxxPmXVPHpdNRyK47JY4d1hhbe25YVz4e9vTXCLDxvHkRXEAeBC
Yeah I seed some printable firearms files torrents over I2P, and seed other stuff I find on tracker2.postman.i2p
All traffic over I2P is encrypted unless you use an outproxy (which isn’t as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.
Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It’s running an exit node that can get you into some sketchy waters with your ISP/law enforcement.