all connections to the Internet are forced to go through the Tor network

Does this mean that connections with I2P also go through Tor somehow?

No. I2P is one of the few exceptions to this rule.
Comment by Tails Sun 12 Feb 2012 04:22:48 PM CET

how you fix deanonimised i2p sites? sorry in my inglish in russian http://forum.i2p2.de/viewtopic.php?t=5154

Comment by Anonymous Sun 12 Feb 2012 08:30:05 PM CET

I dont know any Russian and the machine translation I read was barely comprehensible, so I'm not entirely sure which concerns are raised in that forum thread. A word that was repeated several times was "external elements", which I assume refers to html elements (e.g. images) located on the open web in an html page fetched over I2P. Such a page could leak your real IP address to the server admin (if she/he has the access logs of both the I2P host and the open web host) but only if you use a really stupid I2P setup (e.g. you only use the I2P proxy for *.i2p, everything else gets direct Internet access).

In Tails such "external elements" would be fetched through Tor, so you wouldn't reveal your IP address. So while this wouldn't deanonymize you it very well could be a strong indicator that you are a Tails user since our Tor + I2P setup may be pretty uncommon.

If there are any other concerns, please post them here or link to sites describing them, but this time in English.

Comment by Tails Mon 13 Feb 2012 10:38:46 PM CET