Beware that iirc, unlike Tor an[d] I2P, Freenet leaks your IP, so I recommend to use a VPN.
If it’s using basic peer-to-peer tech, I suspect you may be right. Been awhile since I looked into it, and as I recall it wasn’t really built for privacy so much as another way to share info with few limitations (hence the free in freenet), so it’d make sense if it did.
The opener version by necessity makes it apparent that you are running a node, but without some coordinated efforts to ‘surround’ you and be in control of all node points connecting to it nobody can verify what requests originated or ended at your host. It’s a plausible deniability state rather than pure anonymity as far as the neighbors go.
Very simple comparison, shout to everyone in the room you want a file, if they have it they’ll send it, if not they’ll ask their neighbors, but they never tell the neighbors it’s not for them they just ask for the file, this continues on until someone has the file and passes lt back to the one who requested it from them up the chain until the first person gets it. In this way even the second person who was the first peer doesn’t know who originally requested it, just that this person asked them.
If it’s using basic peer-to-peer tech, I suspect you may be right. Been awhile since I looked into it, and as I recall it wasn’t really built for privacy so much as another way to share info with few limitations (hence the free in freenet), so it’d make sense if it did.
The opener version by necessity makes it apparent that you are running a node, but without some coordinated efforts to ‘surround’ you and be in control of all node points connecting to it nobody can verify what requests originated or ended at your host. It’s a plausible deniability state rather than pure anonymity as far as the neighbors go.
Very simple comparison, shout to everyone in the room you want a file, if they have it they’ll send it, if not they’ll ask their neighbors, but they never tell the neighbors it’s not for them they just ask for the file, this continues on until someone has the file and passes lt back to the one who requested it from them up the chain until the first person gets it. In this way even the second person who was the first peer doesn’t know who originally requested it, just that this person asked them.