• silverpill@mitra.social
    link
    fedilink
    arrow-up
    21
    ·
    1 month ago

    I think this article is generated by AI.
    Fake CVE numbers. For example, “critical vulnerability (CVE-2021-34527) revealed that Tor Browser leaked real IPs under certain configurations”, but if you look it up, it is about Windows Print Spooler.
    I2P sites also look fake.
    The debian package is called i2pd, not purplei2p

    • CaohuaK 🐺@mitra.xwyqi.org
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      @silverpill >Developers in China use it to distribute tools and circumvent the Great Firewall.

      Tbh, Chinese developers typically use shadowsocks or vmess protocol proxies; they do not use i2p. Futhermore, no one in China knows about i2p, even though its usability is better than Tor.