Internet Anonymity 101: Lurking in Darkness

Aditya Sareen
GDSC VIT Vellore
Published in
6 min readNov 2, 2023

Welcome back! I hope after reading part 1 you are using some form of a VPN while reading this. In this post, we will be diving into TOR and I2P.

TOR

What exactly is TOR? TOR is short for The Onion Routing Project. It is an open-source privacy network that enables anonymous web browsing.

The easiest way for me to explain TOR would be through an image-

Photo taken from iStock

An onion? Yes, that’s exactly how TOR works. You can see that the layers of the interior do not follow a straight path but a curved one instead. TOR follows the same principle — End-to-end connection is not established through two entities directly, but rather the traffic is rerouted over multiple servers(aka relays) across various countries which hides the original IP address and facilitates anonymous browsing.

Photo taken from Avast

In this image, the boxes that are colored denote the intermediate servers through which traffic is routed before reaching its final destination.

TOR allows you to turn into a digital ninja - by keeping your online activity in the shadows(Nope being in the shadows does not make you Batman, sorry to burst your bubble).

The encryption process that the TOR software uses hides users’ identities, requests, and communications while still enabling them to use the Internet as they normally would.

How to use TOR?

All you need to do to use TOR is to download the browser it offers.
You can find it at: https://www.torproject.org/download/

Pros of TOR

  1. Enhanced Anonymity: The first pro of using TOR would be genuine anonymity. Since traffic is routed through multiple servers and each server only knows about the server before and after it, anonymity is enhanced.

The green dot is the source, the red is the destination, and the blue dots are the intermediate servers. The yellow circle depicts the visibility of the server in the middle. (I know my design looks quite shabby, there’s a reason I’m writing this and not designing its cover)

2. Censorship Bypass: TOR is effective in bypassing internet censorship and accessing blocked content.

3. Protection: TOR helps protect your online privacy by preventing websites and online services from tracking your real IP address. This helps prevent advertisers from profiling your online activity.

4. Open Source: TOR is an open-source software that enables transparency and its users can audit the code to ensure it is free from any vulnerabilities.

Cons of TOR

TOR may seem like the ultimate guide to go MIA but like always there are some downsides to it.

  1. Speed: Since TOR uses multiple servers to transfer information from source to destination, this harms the speed of transmission.
  2. Exit Server Risk: The final server in the transmission path has access to the unencrypted data and in case that node is not secure, the data may be vulnerable.
  3. Blocked Access: Certain websites may block access to the exit nodes of TOR to prevent abuse which causes difficulty to the users at times.
  4. Global Adversaries: Global Adversaries with enough resources have the capability to correlate traffic that enters and leaves the TOR network which heavily compromises user anonymity leading to a Matrix situation.

That covers it for our friendly onion, now let’s move on to the Invisible Internet Protocol aka I2P.

I2P

The Invisible Internet Protocol is a P2P(peer-to-peer) anonymous network to keep you from being monitored as you browse through the Internet. I2P works by encrypting and routing data through a network of nodes, creating a private and anonymous communication layer on top of the internet.

Unlike many other networks that allow anonymity, I2P doesn’t try to provide it by hiding the originator of some communication and not the recipient, or vice versa. It is designed for users to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties(like your neighborhood gossip aunties).

Users of I2P act as both clients and routers (nodes) in the network. Data is encrypted in layers, similar to the concept used in TOR. Each router in the path can only decrypt one layer, revealing the address of the next router in the chain.

Image taken from Wikipedia

How to use I2P?

To use the Invisible Internet Protocol, just head over to https://geti2p.net/en/ and follow the steps to download it for your operating system.

Pros of I2P

  1. Integrated Services: I2P includes its integrated services(eepSites). These are websites and applications that operate exclusively within the I2P network, providing an anonymous space for various online activities.
  2. Anonymous File Sharing: I2P supports anonymous file sharing within its network. Users can share and distribute files without compromising their anonymity.
  3. Prevents Sybil Attacks: I2P has mechanisms in place to resist Sybil attacks, which involve an adversary controlling a large number of nodes in the network which in turn gives them an undue advantage. This enhances the security and integrity of the I2P network.
  4. Darknet Focus: I2P is designed to create a darknet which is a private network within the Internet. This is beneficial for users seeking a higher level of privacy and anonymity.

Cons of I2P

  1. Speed: I2P involves multiple layers of encryption and routing through a network of nodes, which tends to result in slower speeds and increased latency similar to TOR.
  2. Limited Content and Services: The content and services available within the I2P network are limited compared to the regular internet. Users may not find the same amount of information while using I2P.
  3. Steep Learning Curve: Setting up and understanding the nuances of I2P might be challenging, especially for those not familiar with privacy-centric networks.
  4. Small User Base: The user base of I2P is smaller as compared to TOR. This can result in fewer available resources, slower development, and limited community support.

TOR or I2P??

Now you must be wondering if I had to go a step above a VPN, would it be better to go with TOR or I2P?

TOR is designed for anonymous browsing on the regular internet whereas I2P operates as a separate, enclosed network, hosting its services and applications.

In terms of security, I2P does not have exit server risk whereas this exists in TOR. I2P does not have exit nodes the way TOR does. In TOR, an exit node is the point where traffic leaves the TOR network and enters the regular internet. This is the point where the user’s IP address becomes visible. In contrast, I2P operates as a separate network. Traffic within the I2P network stays within the network and does not exit the regular internet in the same way TOR traffic does. This design reduces the risks associated with exit nodes, as there is no direct exposure of a user’s IP address to external websites. I2P also allows anonymous file sharing on a large scale while TOR isn’t well suited for the same.

I2P being a separate network, allows more anonymity as its boon but its curse is the limited information. TOR has access to all the information on the regular Internet which is not the case in I2P. TOR also has a larger user base so a broader range of community support as compared to I2P which has a relatively lower user base.

The choice is yours

In the end, it all depends upon your specific requirements. If you need privacy along with access to all the regular internet resources while not having to adapt to much of a learning curve, you should choose TOR, but if you require more anonymity, want to operate on a more secluded network, and are adaptable to a steep learning curve, you should choose I2P.

For now, that’s all from your Seema Aunty (anonymity matchmaker), but don’t worry I’ll be back with more!

--

--