And your i2p router how much?

Yesterday afternoon, over a lifetime of work i2p I saw a maximum of nodes. More than 5000. When I started many years ago, the limit was 1000.
I am very interested to know the statistics of your routers.

Statistics at 9:00
NODES
Active: 1511 / 3058
Fast: 41
High-capacity: 150
integrated: 563
Known: 3668

3 s: 288,9 / of 289.1 KBps
5 min: 239,8 / 235,6 KBps
Total: 70,64 / 69,11 KBps (3 days)
Volume: 20,16 GB / GB of 19.72 (3 days)

PS: I would like to turn to the network users. Do not turn off the router at night. On average 4000 a day, and at night drops to 2000.
October 3rd 19 at 03:24
4 answers
October 3rd 19 at 03:26
Do not turn off.
It is necessary to fill the network of interesting content — then there will be more nodes.
TO like, however.
I'm just thick siderow already for many years =) - deonte_Bahringer commented on October 3rd 19 at 03:29
October 3rd 19 at 03:28
You can accidentally go to the site in I2P and deanonymization...
You can go to I2P gullkrona — and also...


It's great to write about it?

Installed yourself on a RaspPi, but while also fighting with my modem does not give an easy way out in the NAT. Still don't know what to fear and what buttons not to push. But just know whom to fear :-D
You can be more precise about this read.
Anyway, informative article. - deonte_Bahringer commented on October 3rd 19 at 03:31
Looked quickly now. Home read more closely still. In the article it seems like the settings only but no explanation how not to make mistakes. - Mauricio.Lebsack commented on October 3rd 19 at 03:34
At the end of the article a couple of paragraphs. - Mariana.Mor commented on October 3rd 19 at 03:37
great. now it became a little clear that can give but not how to deal with it. but I think that will come while using.

now my opinion about the translation of the whole matter in C++. who will do the final compilation? there is always a Judas who will easily build "their vision work." further, this script known example of this TOR. But as I understand it, the only problem the end user, but not other members of the network is good. - Mauricio.Lebsack commented on October 3rd 19 at 03:40
October 3rd 19 at 03:30
I think cífer will only increase. Thor because leaky recognized, and other alternative vrodeby not.
It's complicated.
I2P is just a more sustainable thing than ТOR.
Although...
You can accidentally go to the site in I2P and deanonymization...
You can go to I2P gullkrona — and also...
I2P actually is and is not to blame.

In this world nothing is 100%. - deonte_Bahringer commented on October 3rd 19 at 03:33
October 3rd 19 at 03:32
Well, the "rescue of drowning — the handiwork of drowning" and everything:
— we need to understand how it works — this will give an understanding of what is and what is not;
— it is necessary to read the materials about vulnerabilities in I2P (alas, few);
— it is necessary to best protect themselves on their side (technically and organizationally);
— it is necessary to understand which resources to visit, and what — not.
Last night I wandered across the network.
A lot of resources, in which external content (any YouTube, etc).
A lot of resources with unknown scripts.
A lot of resources that require authorization and are interested in my personal data.
It may be a somewhat paranoid approach. However, for me, these resources are questionable. This kind of Ineke enough.

Find more questions by tags I2P