• Corroded
    link
    fedilink
    31 year ago

    I’ve seen a few similar stories over the years about people operating TOR exit nodes. I could be wrong but doesn’t I2P’s garlic routing use everyone as a router? Wouldn’t that make merely using I2P as potentially dangerous?