Recent comments
NapkinBlizzard wrote
Reply to Levitation Technology by 0x45
cumlord wrote (edited )
Reply to comment by Oaloo in Methods for creating torrents to seed? by Oaloo
tuckit can be used to do this sort of thing http://git.simp.i2p/simp/TuckIt
it uses either mktorrent or torf to hash torrents. if you just need that functionality to automate things maybe seeing what's going on http://git.simp.i2p/simp/TuckIt/src/branch/main/modules/torrent_functions.py could help.
you could check a directory every so often and give one of these things the location of any new files, then have it symlink the data files to the torrent client directory then move the .torrent file in. http://git.simp.i2p/simp/i2music/src/branch/main/updateplaylists.py is doing other things, but this is what it does starting line 678
Oaloo OP wrote
Reply to comment by z3d in Methods for creating torrents to seed? by Oaloo
thank you, but i was hoping for something i could automate to some extent. like on a cron job.
z3d wrote (edited )
Reply to Methods for creating torrents to seed? by Oaloo
Any I2P-capable torrent client should be able to create torrents. If you're running i2pd, try I2PSnark Standalone, either the + or "vanilla" version. If you're running a Java-based I2P, you'll already have I2PSnark available.
- I2P+Snark standalone: skank.i2p/installers/i2psnark-standalone.zip
- I2PSnark vanilla: stats.i2p/docs/i2psnark-standalone-2.8.0.zip
Chronic wrote (edited )
Reply to comment by j8810kkw in A curious thing about tube.i2p by j8810kkw
You're Welcome, I haven't heard of this project before, so I can't say if you should use it or not. I usually just use Invidious/Piped instances, and sometimes Freetube as well, however It's still a good thing that there are alternatives. For Tube, If you already compiled it and it works well with you, let me know if it's worth the build.
Curiously, I was wondering if there were any clients written in Rust, and I found this. It uses Tauri and I like the fact this it is way less bloated and more efficient than Electron clients (e.g. Freetube). Though, the RustyTube project is still in its early stages, but still sounds cool to give it a try nonetheless.
cumlord wrote
Reply to comment by paw_slut in Ave Imperator (alternate) by paw_slut
i'd smash
paw_slut OP wrote
Reply to Ave Imperator (alternate) by paw_slut
In retrospect, I should have made him much fatter...
j8810kkw OP wrote
Reply to comment by Chronic in A curious thing about tube.i2p by j8810kkw
Thanks Chronic. Think I can use https://git.mills.io/prologic/tube from here since it seems a bit more useful and stuff? I'm sure it could be worth a try hosting a separate video host or something.
Chronic wrote
Reply to Mr. Fox by StableDiffuser
More like a 'Mrs. Fox' with the gentleman's suit.
Chronic wrote
Reply to comment by bolvan in A curious thing about tube.i2p by j8810kkw
- Nope, the site doesn't work with either because it is already down.
- I2pd rocks, and so as the other clients, as long it works well with whomever uses them.
Chronic wrote
Reply to A curious thing about tube.i2p by j8810kkw
Well, you just answered your own question. Tube.i2p used to be an anonymous YT frontend, but in reality it was so slow and unreliable, so don't even bother.
If you need to, you can simply use an outproxy and connect directly to any YT frontend of your choice that is near you; would be more reliable than an eepsite/hidden-service. It's also a good idea to create a separate profile for your outproxy use-cases, especially for installing extensions like Libredirect, Sponsorblock, etc..
not_bob wrote
Reply to comment by bolvan in A curious thing about tube.i2p by j8810kkw
i2pd offers a http proxy server, it works well.
i2pd is great, if you are ok with flat config files and no limits.
bolvan wrote
Reply to A curious thing about tube.i2p by j8810kkw
- Site don't working with socks proxy. Must be http.
- I2pd sucks.
j8810kkw wrote (edited )
Reply to I2Music: Self hosted JS-free Music Player by cumlord
Project looks interesting. Is there a link to the demo? (NVM it's http://music.simp.i2p)
cumlord wrote
that is one intestine
not_bob wrote
That made my day. Thank you!
cumlord OP wrote
Reply to comment by Mulberry in I2Music: Self hosted JS-free Music Player by cumlord
thanks :)
righttoprivacy OP wrote
Reply to comment by libertas0ether in Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
I know they are working on their own OS and such. Could be disinfo.
But I won't bet my computer on it. ;)
Mulberry wrote
Reply to I2Music: Self hosted JS-free Music Player by cumlord
Cool project OP
libertas0ether wrote
Reply to Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
we're at a lvl far removed from the inner workings. evrything could be propaganda lies, west and east. the tidbit about "unknown encrypted data packets" triggering "pre-implanted backdoors" in windows is funny. thnk these are target based or exist widely on every windows installation? waiting for a neutral security auditor to find and expose?
i wonder what incentives lie in wait for such an auditor.. $$$ and recognition, or something more sinister
codrus wrote
Reply to The Stew Peters Network by Saint_Cuthbert
90% on target. 10% possibly off target.
codrus wrote
I forget what it is called, but AMD has their own version as well.
cumlord wrote (edited )
Reply to comment by blueraspberryesketimine in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
it probably could, to me that along with traffic analysis are things that fall more into state sponsored level attack. guess avoiding those chipsets is the way or disabling it, but only 3 people are going to do that. like i'd think that at least with intel it's basically a backdoor, probably would take a fair amount of effort for someone outside of them to exploit it. but i guess that doesn't stop intel from gathering intel, lol
there's a surprising amount of low-lying fruit that can be way easier to do for non state actors. Best to assume your ip address is known to be running i2p as public knowledge, and like just poking around the netdb will give info that can sometimes lead to deanon if not careful
blueraspberryesketimine OP wrote (edited )
Reply to comment by cumlord in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
I wonder how the intel management engine and AMD PSP could be used to track I2P users. They make up the majority of the nodes on this network. We really don't have a way to fight that unless we all jump to RISC-V right? Also, that article is interesting but incredibly outdated. It's from 2010. Id imagine the security posture of i2p has improved dramatically since then.
0x45 OP wrote
Reply to comment by NapkinBlizzard in Levitation Technology by 0x45
Thank you for your replay!