this post was submitted on 13 Sep 2024
545 points (95.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54758 readers
140 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] liveinthisworld@lemmy.dbzer0.com 1 points 2 months ago (1 children)

What you're talking about is supposed anonymity in obfuscation, and that has been proven to not work.

Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement

[–] lapis@hexbear.net 1 points 2 months ago

What you're talking about is supposed anonymity in obfuscation, and that has been proven to not work.

if it's been proven not to work, then neither I2P nor VPN is worth using, no?

most VPN companies keep logs and can be subpoenaed.

well, sure, but that's why anybody looking into a VPN is generally advised to use specific, known-good VPN providers who don't keep logs and who, preferably, aren't headquartered in a country with strict IP law.