Artwork

Content provided by Seth For Privacy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Seth For Privacy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Network privacy via i2p w/ idk and Sadie

1:00:16
 
Share
 

Manage episode 322032850 series 2932360
Content provided by Seth For Privacy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Seth For Privacy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the Show.

  continue reading

Chapters

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 episodes

Artwork

Network privacy via i2p w/ idk and Sadie

Opt Out

40 subscribers

published

iconShare
 
Manage episode 322032850 series 2932360
Content provided by Seth For Privacy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Seth For Privacy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the Show.

  continue reading

Chapters

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide