this post was submitted on 04 Feb 2026
4 points (100.0% liked)
tech
3 readers
1 users here now
founded 4 weeks ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
"easy" is a stretch. Another user already posted about this:
"My understanding of i2p is that it's extremely difficult to have any impact with DDOS on the i2p network. It's basically impossible if you cycle your Id and eepsite. Who ever is doing the attack on the network has to have a huge margin of the bandwidth to control/ throttle data. It's how the network protects itself from these types of things specifically, and why many tor users switched, including myself a few years ago when tor was on a month long ddos site hostage situations constantly and most services couldn't be accessed.
This literally shouldn't be possible unless someone is hosting an absurd amount of the network. Like a letter agency or some entity similar.
This kinda of is a validation to me that invisible internet is a optimistic dream rather then a reality we can strive for away from abusive surveillance."
is it likely to be iran, since theyre trying to filter it too
Kimwolf Botnet Swamps Anonymity Network I2P #63863 (github)
LOL. Looks like someone had their entire botnet connect to the network, though it wasnt malicious.