I2P is a proxy service that passes through all traffic, including messengers and other applications.

It is much slower than Tor, but provides both anonymity and privacy.

There are also special distributions for the operating system: you need to install them on your computer and restart it, after which you can log out to the darknet. Then you need to restart your computer again — and all data about your activity disappears.

What do “anonymity” and “privacy”/ “privacy” mean in the darknet?

“Anonymity has really died, as everyone likes to say now,” says Arthur Khachuyan, CEO of Tazeros Global Systems, an expert in big data collection and analysis. — It is almost impossible to do something without identifying yourself now. But there are so—called levels of anonymity – depending on what and from whom you are hiding.”

According to Khachuyan, Tor Browser allows you to achieve a high level of anonymity of your actions on the darknet. However, the provider always knows who you are: he has your passport details. He can’t track specific actions inside the darkweb, he can’t figure out which of the users inside the apartment building is there, but he always knows that we use a VPN connection or Tor Browser.

“There were precedents — for example, when the mathematician Dmitry Bogatov hosted the output note of Tor. As a result, someone committed illegal actions inside the Tor network, and the special services came to him, because his IP address was the last one, according to the provider,” the expert recalls.

In April 2017, mathematician Dmitry Bogatov was accused of calling for terrorism and mass riots: his IP address coincided with the one from which extremist comments were left on the sysadmins forum. Bogatov himself explained this by the fact that he supported the output node of the Tor network on his computer so that others could use his IP address. In May 2018, all charges were dropped, but a new defendant was immediately found. It was Vladislav Kuleshov from Stavropol, who admitted his guilt.