Why would I2P allow outproxies if it's not even recommend to use one anyways?

Misc topics about I2P
Post Reply
Chef K
Posts: 26
Joined: 14 Apr 2025 12:54

Why would I2P allow outproxies if it's not even recommend to use one anyways?

Post by Chef K »

I2P was never made to use outproxies to access the clearnet. But that has never stopped people from trying anyways.

On the official I2P website (alongside other sources), they state that I2P was never made for use with the clearnet and they even redirect you to Tor for clearnet useages.

http://i2p-projekt.i2p/en/about/browser-config
https://mk16.de/assets/docs/outproxies_ ... nglish.pdf
"The only difference is that the Tor network has more exit nodes than I2P outproxies. It is therefore recommended that you use Tor to surf the Clearnet."
This is a bit perplexing to me. Why would you even allow users to do something you wouldn't even recommend?

-Chef K
anikey
Posts: 98
Joined: 30 Nov 2023 20:08

Re: Why would I2P allow outproxies if it's not even recommend to use one anyways?

Post by anikey »

It's not really discouraged. There is even a default outproxy supplied by an organization (stormycloud). There are also some other public outproxies from the community. One can even run their own private outproxy.

It's just different from Tor because in Tor you get different exit nodes at different times, while in I2P your outproxy usually stays the same.

And Tor exit nodes are an inherent part of the network protocol, while in I2P outproxies are basically just another application on top of the network.
Chef K
Posts: 26
Joined: 14 Apr 2025 12:54

Re: Why would I2P allow outproxies if it's not even recommend to use one anyways?

Post by Chef K »

Wouldn't it make using a outproxy more private if you randomly cycled between different outproxies?

Is there a way to do this automatically? Maybe a service that does this for you with may publicly known outproxies?
anikey
Posts: 98
Joined: 30 Nov 2023 20:08

Re: Why would I2P allow outproxies if it's not even recommend to use one anyways?

Post by anikey »

The thing with i2p is that everything has its own address called Destination, which is a pair of cryptographic keys. The whole point of i2p is to hide where this Destination is coming from in the real world.
Your HTTP proxy (which you use to access i2p) also has a Destination.
Other parties that your tunnels communicate with also see your Destination.
One of those parties is the outproxy.
So, for example, if you search for something on Duckduckgo and then open Wikipedia, your outproxy can see: destination qoiwdasdjkfj has made some requests to https://duckduckgo.com and then to https://en.wikipedia.org

The specific page you visit is encrypted by HTTPS (if you are using https to access the sites). But it's not possible to prevent outproxy operator from knowing which sites you visit (since the outproxy needs to know it in order to know where to connect to). (Acetone's public outproxy even lists what domains are visited through it, but not linked to Destinations. See http://outproxy.acetone.i2p ).

What might be possible is to distribute your requests over multiple outproxies.

If i remember correctly, in Java I2P you can just specify multiple outproxies separated by commas (but i'm not sure).
In i2pd, I'm not sure whether that's possible with the default http proxy implementation.

Another way you can do it is create your own HTTP proxy that connects to I2P using the SAM protocol, this way you can code any logic into it, including outproxy cycling, etc. But programming knowledge is required. SAM documentation can be found on the official site of i2p, http://i2p-projekt.i2p

But the thing with tor is that it usually runs alongside i2p, so external observers may see that you use both i2p and tor at the same time. Moreover, tor does not have the same cover traffic that i2p provides with transit tunnels, so it is easier to do time correlations.
It is probably possible to run tor on top of i2p by using a bridge node inside of i2p.
Post Reply