P2Ping with other un-anonymous clients while staying anonymous yourself?

Status
Not open for further replies.

BirdofParadox

New Member
I read with programs like I2P, it is not possible to share with clients who are not also on the I2P network. So, my question is: Is there any freeware or shareware that allows you to stay anonymous when you're sharing files with people who do not have the same level of anonymity? Any help would be appreciated! :D
 
I read with programs like I2P, it is not possible to share with clients who are not also on the I2P network. So, my question is: Is there any freeware or shareware that allows you to stay anonymous when you're sharing files with people who do not have the same level of anonymity? Any help would be appreciated! :D

1. Your ISP can always see what you are doing, regardless of what "protection" you have against them or anyone else seeing

2. When you connect to others through P2P, they can see your IP anyway

3. With point 2 taken into consideration, unless you are using a P2P client to share illiegal content, it shouldn't be a problem. But ofcourse, you aren't using it for illegal down/uploading, otherwise you wouldn't have asked this question because it would be against forum rules:

Software Discussion Policy


Discussion of any of the following is NOT allowed at Computer Forum:

* Promoting piracy as an alternative to the legal purchase of computer software or media material.
* The use of torrent trackers or p2p software to obtain copyrighted material. Any discussion of programs like Limewire, Frostwire, eMule, eDonkey, etc.. is not allowed, whether or not you believe or suggest it's for legal use.
* The offer or solicitation of invitations to private torrent tracking websites, such as Demonoid. Public sites, like The Pirate Bay, cannot be discussed here.
* Jailbreaking an iPhone/iPod Touch.
* Illegally modified OS versions such as "XP Black," which are typically distributed illegally.
* Installation of a Macintosh operating system on a PC; also know as a "Hackintosh" system.
* Advice on how to crack or circumvent legitimate software activation. This includes: key generators; cracked executable files; re-arming software trial periods; brute force methods for obtaining activation keys; OEM activation hacks - generally, anything that would otherwise allow you to obtain or use licensed software outside of the developers End-User License Agreement (EULA) and/or Terms of Service (ToS).
* Cracking or bypassing an administrator/any other user log-in password.
* Stripping DRM from media files.
* DVD/Blu-Ray disk decryption.
* Game console ROMs and emulators.
* Software that facilitates the unauthorized entry into a network.
* Posting malicious links or attempting to distribute malicious software.
* Keystroke recording software, or any application that allows you to secretly monitor the activities of another computer user.
 
Status
Not open for further replies.
Back
Top