Hey guys,

I am running an I2Pd-Node on my raspberry pi somewhere in Germany and I am loving it so far.

About the ethical implications I am at peace with me, because I know, that it’s not possible to allow good things without allowing the bad things too.

Sometimes I am a little bit concerned about, what a paranoid government could do. Technically - I don’t know what I am forwarding. And since we’re not talking about providing an exit-node (to clear-net) like we usually do with Tor, the risk should be greatly reduced as well.

As far as I know, theoretically this scenario could be possible: A large marketplace for illegal stuff appears within the I2P-Network. Law enforcement connects to it and tries to identify the “hops” between them and the marketplace (one by one) and my node is one of it. I know how crazy this sounds. Not very likely, but not impossible as well.

How do you think about this? Are there any recommended precautions you could take to prove you’re not the criminal, if LE surprisingly knocks at your door?

~sp3ctre

  • drkt@scribe.disroot.org
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    11 days ago

    If the cops come knocking, just make sure you’re not actually doing anything illegal, because processing encrypted data is not. All your computer is doing is taking in encrypted data, fucking with it, and spitting it back out. You don’t see the contents of it. You can’t know what is happening, so neither can they.

    Sincerely, long-time hoster of Tor and I2P nodes in Denmark.

    • sp3ctre@feddit.orgOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      edit-2
      11 days ago

      Good to hear!

      Not sure about Danish Law, but in Germany we’ve got the “Störerhaftung” (transl. disturber liability) which says that individuals can be held liable as disturbers for enabling third-party legal violations (such as copyright infringement) even it they are not the direct perpetrator.

      So far, I only heard about it in some copyright cases. Also not clear, if it could be applied on I2P, because it was more a torrenting thing…

  • marxismtomorrow@lemmy.today
    link
    fedilink
    English
    arrow-up
    6
    ·
    11 days ago

    I2P is an alternative encrypted routing system. Legally and technically not much different than the normal internet.

    If:

    Nefarious Actor -> Router -> <{internet router}> <{internet router}> <{internet router}> <{internet router}> <{internet router}> -> Router -> Nefarious Webserver

    is a routing chain wherein each <{internet router}> is legally protected because it is indiscriminately acting to forward traffic regardless of nefarious activity, then:

    Nefarious Actor -> router -> <{i2p router}> <{internet router}> <{i2p router}> <{internet router}> <{i2p router}> <{internet router}> <{i2p router}> -> Router -> nefarious website

    Would be equally protected. You are not doing anything different, you are simply acting as an additional router, indiscriminately passing traffic along.

    In the US, according to recent supreme court cases, this is constitutionally and legally protected - you are providing an intermediary service for general use and thus are protected the same way an internet carrier is. Most EU countries have something similar, and the EU has special protections for smaller service providers under the DSA. Since you are closest to an ISP under German law, just a very, very, very small one; you should be legally protected simply because you are not actively participating in nefarious activity, just users of your service might be.

    Vaguely based on:

    https://freedomhouse.org/country/germany/freedom-net/2024

    https://www.gesetze-im-internet.de/englisch_urhdag/index.html

    https://digital-strategy.ec.europa.eu/en/policies/digital-services-act

    https://www.supremecourt.gov/opinions/25pdf/24-171_bq7d.pdf

  • DahGangalang
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 days ago

    I’m #Big curious about this too, and its the primary reason I haven’t set up a permanent node.

    Mostly commenting so I know to revisit the thread, but here’s hoping for some quality responses for all our sakes.

  • Holla@feddit.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 days ago

    From https://www.anwalt.org/tor-browser/

    German law gives the citizen a certain amount of room for manoeuvre in safeguarding his own rights on the Internet. Encryption, proxy connections and other measures that also use the darknet and Tor browser are legal. Encryption of data and connections is even described in the laws on data protection as a necessary protective measure.

    The setting up and operation of a highly encrypted network is not prohibited. This is exactly what the Onion network represents: A parallel network to the well-known Internet, which redirects the otherwise direct requests and thus obscures the sender. In addition to the redirection, relatively secure encryption methods are added, so that none of the transmitters ever have the plain text in front of them.

    I2p, unlike Tor, has the advantages that it is less known and the nodes are not in a public list; as an i2p node operator, you would have enough time to react if the darknets were to be taken against.