Dunno it was fine for me always I was 940mx with their closed driver just nvidia dropping this generation as author of question have on nvidia 580 version but mint will be fine for him.
Try to buy ukrainian sim card they don't have strong kyc so possible to find gray simcards ,since in there it from begging of 90x was not kyc and sim card randomly just was sold on the streets and everybody could buy it.
And how in the past companies was making money from producing phones in times of Nokia in 2008-2009 when there no good internet and no ability to spy on user
We don't have on the market device which would sell witthout Google services by default just with aosp like linage .I wanna just phone with easy unlockable bootloader with aosp no google services(or If I wanna them install it in 3 clicks how it was implemented in the past for meizu phones and same way with 1 click install root ) and would not cost a lot (fairphone) I looked on aliexpress even there no such options they make phones but without opened bootloader
The I2P netDB isn’t a single dumpable list like you’re suggesting. It’s a Kademlia DHT stored across rotating floodfill routers. Floodfills aren’t static — routers get promoted/demoted based on bandwidth, uptime, and capacity — so the view of the network is constantly shifting. A normal router only ever queries small slices of that DHT, meaning you never get the “whole picture” from one vantage point. That’s a deliberate design choice to make enumeration hard.
On the traffic side, I2P isn’t just onion-style routing. It uses garlic routing, where multiple encrypted “cloves” (messages) are bundled together into one garlic message. This kills the simple “one in → one out” traffic correlation trick. Add to that the transports: NTCP2 is indistinguishable from normal TLS over TCP, and SSU2 is UDP with full encryption, padding, and replay protection. From a DPI standpoint, it looks like generic encrypted noise — there’s no clean handshake to match on like with old Tor circuits.
As for blocking, I2P is decentralized. There are no directory authorities to censor, no fixed bridges to burn. Floodfills are chosen dynamically and constantly refreshed, and peers discover new ones automatically. The bigger the network gets, the harder it is to enumerate and blacklist enough routers to make a dent. Censors can try whack-a-mole, but the distribution effect scales against them: more peers in more ASNs across more countries means higher cost to block.
So yes, you can suspect I2P traffic if you really try, but fingerprinting and wholesale blocking don’t scale — the protocol was designed specifically to make both correlation and censorship exponentially harder as adoption grows
Details: https://www.youtube.com/watch?v=95hSAMEwrlM
Tor easy to block yes ,i2p much more harder like really harder, in Russian tor blocked ,vpns blocked by DPI system ,but still it possible to bypass it with something like byedpi. But i2p working much harder then just tor or usual http
Wait make ur wife happy because of these devices? That insane how u guys were living 20 years ago let not pretend that this devices bring something really important that was not possible to do in old way in the past ,they gave just some alternative way to do stuff including all ur things u said.I am so glad that my family don't understand anything in tech in such things and using just usual phone calls and for video they using something like telegram
Sound driver for Mac? What Mac year is it