anonymous
browser extension
these two do not mix well. almost any extension can be detected by a site and used to fingerprint you.
You actually can use I2P with JS disabled as many eepsites work without it.
That is not true. On chrome, they could be fingerprinted using the way that extensions load remote assets (which I dont think is still possible). On Firefox, that has not been possible (maybe ever but at least for a while). The way that extensions are fingerprinted requires detecting the way they interact with the web pages DOM, which is not something many extensions do.
check out how creepjs implements detection for many common extensions…
The point to my original comment is fingerprint of extensions isn’t straightforward or free, ie requires intentionally designing a fingerprinting technique tailored to identify its behaviour.
CreepJS can really only detect Chrome extensions and very few Firefox ones. On Firefox, it can detect NoScript but not uBlock for example. This isn’t to say that uBlock can’t be fingerprinted, just that it hasn’t yet in CreepJS. Some extension don’t touch the DOM at all or produce any fingerprintable behaviour to the web page, so there for can’t be detected. Some don’t produce weird behaviour until a user interacts with some element in the extension or webpage.
What is i2p?
A P2P application for anonymous communication. There’s chat rooms, forums, the whole range of things, all peer-to-peer, all decentralized, all built with privacy and anonymity as a feature.
A peer to peer internet
I2P is really cool tech, wish more people knew about it. In a similar vein: #hyphanet (formerly #freenet) and #nostr
and yggdrasil and lokinet
Misleading title. Using this with your day to day browser burns out any idea of anonymity.
If you want to be safe, make a bare bone Arch Linux VM and use this extension with GNU Icecat. Also change your DNS from your ISP to something like Quad9.
I can’t figure i2p out or nostr