It seems like what i2p is doing largely overlaps with what tor does. How do the two compare, and why would you use one over the other?

  • 0v0@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Also, unless a torrent client is specifically written with privacy in mind, they are likely to leak your real IP by connecting to trackers/peers using UDP, which is not tunneled through Tor.