Pretty sure it’s some misapplied heuristics for previously identified bad clients, but that should only trigger an alert (with details!) in most cases and not block you if it’s not also paired with any known malicious activity
Any ticketing system set up like that is just begging for abuse. If they don’t have queue managers then the team should share the hit if they just leave the ticket untouched
Assuming enough water that most of it doesn’t boil, then my math would still check out, but yeah, any substantial amount of boiling forces you do do the math in multiple steps to handle that
It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address....
This is not how the law is applied to packet switching.
If it was store and forward then maybe just maybe law enforcement would care, but anybody smart enough to set up an I2P node to research it and who tried to track where packets from from would first see the packets originate from their own local node at 127.0.0.1, then in the I2P console they could see that packet came in via an active half-tunnel from their own end interfacing with the endpoint node of the other side’s half-tunnel, and they would know that node has no idea what it’s sending (just like their ISP)
I2P doesn’t behave like Tor by default, it’s designed around connecting to internal peers within its network so your browser won’t treat it as a proxy but default and you have to specifically configure it to route traffic to the I2P network
1: then they would go after literally anybody running a node
2: their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.
3: by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.
Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it’s conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn’t really happen much anymore. You don’t even need a great lawyer, just an average one who can find the precedence.
There’s no “additional fingerprints” of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn’t actually know and was just a blind relay (just like how mailmen aren’t liable for content of packages they deliver).
Your argument is literally being used to argue that nobody should have privacy because those who don’t break laws don’t need it, yet you yourself are arguing for why we still need privacy if we haven’t broken laws. The collateral damage when such tools aren’t available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a “haystack” (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.
In addition, it’s extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It’s usually infiltration that works, so you running an I2P node will make zero difference.
Buying a new car is not better than keeping an old one (lemmy.world)
Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?
One chestnut from my history in lottery game development:...
Double-slit (lemmy.ml)
How geologists collect lava (i.imgur.com)
RANT: I hate the fact that my ISP can restrict access to certain sites
How can it possibly be, that an ISP, which I’m paying for gets to decid, which sites I’m allowed to have access to, and which not?...
PSA: Don't torrent over TOR (tor.stackexchange.com)
It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address....
Google forced to reveal users' search histories in Colorado court ruling (www.techspot.com)
Hidden Beauty - Safely Endangered (lemmy.ca)
Source: www.webtoons.com/en/comedy/…/viewer?title_no=352&…
qBittorrent 4.6 launches with I2P support - gHacks Tech News (www.ghacks.net)
2 way communication is key (lemmy.zip)
Boston.com: Giant inflatable ducks are floating in a Maine harbor, and no one knows where they came from (www.boston.com)
Don't have a lightsaber but I do have a baseball bat, you little shit (startrek.website)
12-year-old saves drowning man, credits CPR learned from 'Stranger Things' (abcnews.go.com)
AAAAAHHH! *Listens carefully* (slrpnk.net)
Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor (www.wired.com)