• youmaynotknow@lemmy.ml
        link
        fedilink
        English
        arrow-up
        33
        ·
        6 days ago

        Our ISPs are too cheap and lazy to even try looking. I still use I2P, but only because I need to justify my tin foil hats collection.

      • Grass@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        9
        ·
        6 days ago

        I have had like 14 while I was still in school here in canada. if things haven’t changed you just ignore them because they can’t do jack if you don’t respond. Someone I worked with was blown away when I told him this because back home he was banned from all but the slowest ISP.

        • BakedCatboy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 days ago

          Hah I wish we could ignore them. It seems to just vary from ISP to ISP in the US but our small town ISP turns off your connection and puts you behind a captive portal forcing you to click through and accept what you did wrong before your connection is turned back on.

      • Robust Mirror@aussie.zone
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        6 days ago

        That is supposedly the case in Australia as well but I haven’t got a letter from telstra since around 2004 and I have never used a VPN and watch all my shows and movies via torrents so either I’m extremely lucky or they stopped bothering.

        Though recently I started paying the $4 / month for Real Debrid for better streaming performance, which is just as good as a VPN for torrent anonymity. I used to be fundamentally against the idea of paying anything to pirate but honestly this is worth it, I’ve even been able to watch a few shows that had 0 seeders because they were previously cached.

          • psud@aussie.zone
            link
            fedilink
            English
            arrow-up
            10
            ·
            6 days ago

            That says their error was trying American threats “we got you dead to rights, tell us your income and we’ll tell you how much to pay our we’ll sue for punitive damages”

            Which isn’t legal in Australia. They would have been ok if they had asked to send a letter saying “stop it or pay us a reasonable amount for one person viewing the film once” but of course actual damages aren’t enough for film companies

            They were too greedy.

            • Norah - She/They@lemmy.blahaj.zone
              link
              fedilink
              English
              arrow-up
              6
              ·
              6 days ago

              Yeah basically. But part of why no one has tried again is because the judge made it very clear he wasn’t going to just roll over and let them pull their BS. Including setting a bond of $600k for them to even try litigating it. Another part of it is that ISPs used to hand out IP addresses and PII in response to requests from media companies. This was found to be in breach of privacy laws and now those companies would have to apply for court orders, proving malfeasance, to get that information.

    • Lee Duna@lemmy.nz
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 days ago

      Yep, my govt only cares about porn, manga, hentai, online gambling sites, reddit and duckduckgo.

    • sus@programming.dev
      link
      fedilink
      English
      arrow-up
      14
      ·
      edit-2
      5 days ago

      importantly it’s (hopefully) an ISP that operates from a less copyright-happy country and isn’t tied down to tons of expensive infrastructure and long-term contracts

  • dan@upvote.au
    link
    fedilink
    English
    arrow-up
    13
    ·
    5 days ago

    And make sure it’s a VPN that supports port forwarding. Sharing is caring.

    or just use Usenet.

  • Deceptichum@quokk.au
    link
    fedilink
    English
    arrow-up
    50
    arrow-down
    2
    ·
    6 days ago

    I don’t use a VPN because my government has acknowledged that an IP address cannot identify what individual was using it.

    • psud@aussie.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      6 days ago

      I know that government prosecutions for fraud against government use IP addresses

      The IP address identifies the company or home the fraud was done from, the account the money went to identifies the individual

      If breaking the law and able to afford to make it difficult for prosecutors, it’s probably best to make it difficult for the prosecutors, we may have an activist pro copyright holder government in future and logs are forever (or 5 years)

  • DavidGarcia@feddit.nl
    link
    fedilink
    English
    arrow-up
    39
    ·
    6 days ago

    I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P I2P

    • Southern Wolf@pawb.social
      link
      fedilink
      English
      arrow-up
      5
      ·
      6 days ago

      Yeah, if you don’t mind it possibly taking a week to download something… Really like the idea, but in practice it’s very slow for something like that, unless you got a lot of seeders for something maybe.

    • lapis [fae/faer, comrade/them]@hexbear.net
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      4
      ·
      6 days ago

      I2P

      wait, so this would route my traffic through others’ internet connections and theirs through mine? seems like a great way to get implicated for actually illegal activity, like, say, other people running I2P to download and/or upload certain types of porn.

      • liveinthisworld@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        5 days ago

        Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection

        • lapis [fae/faer, comrade/them]@hexbear.net
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          4 days ago

          sure, but I2P’s end-to-end encryption is for connecting to I2P addresses, not the general internet. I’m unclear on whether every node serves as an anonymized connection to the internet, though.

          EDIT: read a little deeper! so no, not every computer connected to I2P is an internet-connected node, but, due to the limited number of internet-connected nodes, I2P does not offer the same level of anonymity that a VPN does, and may struggle from bandwidth issues.

            • lapis [fae/faer, comrade/them]@hexbear.net
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 days ago

              the whole purpose of a VPN is to anonymize internet traffic, so they have many servers that send traffic out to the internet, which improves both anonymity and bandwidth. I2P is more akin to Tor, with anonymizing internet traffic as a bit of an afterthought, and the limited number of internet-connecting nodes makes users’ traffic more trackable.

              • liveinthisworld@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                3 days ago

                What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.

                Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement

                • lapis [fae/faer, comrade/them]@hexbear.net
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 days ago

                  What you’re talking about is supposed anonymity in obfuscation, and that has been proven to not work.

                  if it’s been proven not to work, then neither I2P nor VPN is worth using, no?

                  most VPN companies keep logs and can be subpoenaed.

                  well, sure, but that’s why anybody looking into a VPN is generally advised to use specific, known-good VPN providers who don’t keep logs and who, preferably, aren’t headquartered in a country with strict IP law.

      • KillingTimeItself@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        6 days ago

        it’s all encrypted, and a darknet, so unless you’re routing through exit nodes, or you host an exit node, that information isn’t publicly accessible.

        the other problem here is the “illegal contents” problem, if UPS accidentally ships a human head in the mail, is that the fault of the UPS? If someone mails a bomb to someone else, is that also the fault of UPS?

        Ultimately, there is little to no reasoning as to why you should be capable of getting into trouble, unless you’re storing it, and it’s a very very strict law. But it’s a router, so it shouldn’t be storing anything.

            • potosi@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              3 days ago

              The i2p outproxy is simply a user-specified proxy that i2p uses when you try to fetch someting outside the i2p network. I2p does not implement that proxy itself, therefore it is not part of i2p / it can’t be called an i2p exit node.

        • psud@aussie.zone
          link
          fedilink
          English
          arrow-up
          1
          ·
          6 days ago

          It seems trivial for the US government to tie data into TOR to data out. If you’re hiding things that government is willing to spend effort seeking, it’s not safe.

          • KillingTimeItself@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 days ago

            im not sure to which scale this is true, but TOR specifically is highly centralized, and by design I2P is extremely decentralized, with most nodes running network routing of other nodes. Not that it’s impossible to do, it’s just a lot harder, and not nearly as valuable.

            A lot of the ways in which people are got over shit like TOR is just skill issuing. Don’t run a drug empire on the darknet and you’ll probably be fine. If you do run a drug empire on the darknet, you better be damn fucking good at opsec, and pretty fucking good at laundering money. And even then you’ll probably still end up fucking it up.

  • AnokLola@lemm.ee
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    10
    ·
    5 days ago

    And please don’t use anime girls to refer to every fucking thing in the world