📡 RightToPrivacy & Tech Tips<p><a href="https://fosstodon.org/tags/Networks" class="mention hashtag" rel="tag">#<span>Networks</span></a> like <a href="https://fosstodon.org/tags/I2P" class="mention hashtag" rel="tag">#<span>I2P</span></a> serve useful to <a href="https://fosstodon.org/tags/OSINT" class="mention hashtag" rel="tag">#<span>OSINT</span></a> <a href="https://fosstodon.org/tags/investigations" class="mention hashtag" rel="tag">#<span>investigations</span></a>, <a href="https://fosstodon.org/tags/Journalism" class="mention hashtag" rel="tag">#<span>Journalism</span></a>, and <a href="https://fosstodon.org/tags/activism" class="mention hashtag" rel="tag">#<span>activism</span></a> (<a href="https://fosstodon.org/tags/clearnet" class="mention hashtag" rel="tag">#<span>clearnet</span></a> conns can be more private using <a href="https://fosstodon.org/tags/outproxy" class="mention hashtag" rel="tag">#<span>outproxy</span></a> in I2P).</p><p>You can customize your routing experience, even change number of hops, banning and unbanning routers based on suspicious behavior! 😎 </p><p>💡 TIP: take advantage of using both I2P & <a href="https://fosstodon.org/tags/Tor" class="mention hashtag" rel="tag">#<span>Tor</span></a> browser set up - spreading the risk to personal <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> / <a href="https://fosstodon.org/tags/anonymity" class="mention hashtag" rel="tag">#<span>anonymity</span></a> (+ avoid blocks).</p><p>Right now I2P is under attack: help by running i2p!</p><p><a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="tag">#<span>infosec</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a></p>