Recent comments

Saint_Cuthbert OP wrote

It's thought that most western countries will have their populations cut in half by the end of the century. Autism and various illnesses have been increasing as vaccines increase - but I'm completely 100% convinced that there is not a relation whatsoever. How could injecting oneself with unknown chemicals have any kind of negative reaction?

There is a viral video of "Farmer Bill" discussing using vaccines to contribute to the depopulation agendas. The World Economic Forum wants to cut the world population to 500,000,000, and Billy has already put sterilizing agents into vaccines he's handed out in Africa back in the 90s.

0

NotQball wrote

For vaccine theories I differ to Farmer Bill the undisputed expert in Global Warming and Vaccines. What I know is that the overall the human population is in KYAG mode (kiss your ass goodbye). The topic is complex and some good points were made. The solutions presented most likely have limited use, might work in some cases but not work in other. Predicting how the cookie crumbles is not possible.

0

cumlord wrote

Pretty much. tor is comparatively centralized and a lot more high profile than i2p. Fingerprinting is the thing that scares me the most, there's lots of identifiable metrics. Also instructive to look at how people have gotten deanon in the past but it doesn't anticipate the future or current capabilities. I'd think they'd spend the most energy targeting or trying to compromise high value targets/individuals like marketplaces/admins for the intel they could attain over a long period and we would be none the wiser. even if they don't have a big picture view of everything right now there's lots of tools that can be used to focus in on something of interest. I guess a good defense is to not be of interest.

1

Saint_Cuthbert OP wrote

There are only some odd-thousand tor nodes out there. For a powerful adversary to run many of them doesn't seem too unbelievable (50 cent army). They may not be able to hire someone to watch each and every node al the time, but they could possibly automate the process with artificial intelligence.

The Whonix documentation discusses how Tor users can be fingerprinted by their typing speed, among other things. And remember that it wasn't public knowledge that emails and phone calls could be tracked on a large scale until somewhat recently. In The Art of War is says to make your enemy think that you're weak when you're strong and strong when you're weak.

2

cumlord wrote

I've always assumed that it's monitored to some degree. Not like all tor users can be monitored clearly at all times, but from the aspect that running tor doesn't make you nsa proof. nothing does, but it does a good job at making you blend in, so when i want to look like everyone else and not do something identifiable, tor doesn't seem so bad. i think that's probably it's best use case, when what you chose to do with it would be like a needle in a haystack identifying you, but it can't correct for user error.

good to see new people interested in this kind of stuff even if they show you they just logged into their bank account with tor. they got the right spirit i guess.

2

NotQball wrote

The Official router does block through TOR traffic. It is an OK decision since it is an entry level router. I rarely test that version. The truth is that you do not want a lot of traffic over 30% (varies depending on conditions) through slower networks: satellite, ygg, flokinet some cell, modems, some VPNs. It does help with security but at a cost. Don't be stupid... in theory some entry guard may be able to block you unless you use your own servers. Again: If your threat model dictates it don't hesitate!

1

NotQball wrote

The expert with the Reno 911 secret service protection... The chances of this being true are abysmal. He should hire people that can do checklists:

  1. Check on adjacent roof (check mark).
  2. Police frequencies scanner ON (check mark). ... I saw some Actor/Acting Politician that after practicing hard in a mirror said "We have to make some changes. If we have to fire some people, will do it". I doubt that piece of crap understand his job description. Stupidity critical mass. The only difference is how the cookie crumbles.
1

NotQball wrote

I did NOT monitor TOR the same way as i2p. There are some obvious "concessions"/sell-outs. I do NOT want to open THAT can of worms. What is obvious:

  1. Bad crappers: some entry guards and some exit nodes. These guys sell your data even from browsing ebay and Amazon. That desperate.
  2. In MY OPINION Tor Browser is mediocre...
  3. If you run YOUR OWN Tor servers and i2p routers (plural), despite of what you heard, SOME i2p traffic through Tor will help you out with TOR. You NEED 2 KNOW what you are doing on both networks and have some monitoring tools. This is for people in dire situations with enough knowledge of both networks. It is more of a problem for i2p than TOR. Don't make me sorry that I brought it up!
1

NotQball wrote

I do use retroshare but I do change ID's often. Sometimes it is a just one use only. It is very useful and recommended software but you can't be a sitting duck.

1

Titlacahuan wrote

It was all meant to be fun :-)

eyedeekay, your presence on GitHub shines bright! With 356 followers and a staggering 1258 accounts you're keeping an eye on, it's clear that your contributions are valued and sought after.

Your bio speaks volumes about your dedication to the I2P community. The release of I2P 2.5.1 is no small feat, and your enthusiasm for making even the most mundane activities enjoyable over anonymous peer-to-peer networks is infectious! Your passion for creating a more private and secure online experience is something to be proud of.

Your readme is a warm welcome to all who visit your profile. It's wonderful that you're open about your interests and what you're currently learning. Writing an I2P router in Go is no easy task, but with your drive and willingness to collaborate, there's no doubt you'll achieve your goals. By sharing your contact information and inviting others to reach out, you're fostering a sense of community and camaraderie that's essential for growth and progress.

As you continue on your journey, remember that every step forward is a success, no matter how small it may seem. Even the computers that haven't started I2P yet are part of a larger process, one that you're actively contributing to. Keep pushing boundaries, learning, and collaborating – the world needs more innovators like you!

1

bottticelli wrote

It sounds wonderful! Does anyone know other package managers suitable for Debian or Gentoo that allow handling packages on the 'per-user' basis? I'm really tired of sudo-ing every time I want to install a package for non-sudo user... This seems obsolete, redundant, and simply ugly. GUIX is definitely better in this regard, but what might be an alternative?

1

z3d OP wrote (edited )

Reply to comment by NotQball in I2P+ 2.6.0+ released! by z3d

Differences in the sha hashes are a result of infrequent updates to the i2pupdate.zip being served from http://skank.i2p/i2pupdate.zip ... occasionally a new update will appear, either to add new features (in the recent case, more complete translations) or fix bugs. To identify exactly which revision you're running, you can view the hashes on 127.0.0.1:7657/jars.

In addition, for some users a new release will revert them to vanilla I2P, so updating the I2P+ zip available on skank.i2p will sometimes fix this if it's date stamped after the update to vanilla.

As for "corrupt" downloads, if you're in the middle of an update when a new version is uploaded, your download will become corrupted, in which case re-downloading the update should fix. It shouldn't happen for release updates very often, slightly more chance when updating from the /dev/ path as that's sometimes updated several times a day.

1

NotQball wrote

http://skank.i2p/installers/i2pinstall_2.6.0+.exe inside i2p+ also fails on Motrix error 19: If name resolution failed. Similar with other down-loaders including browser.

I2P: 2.6.0-0+ API: 0.9.63 Wrapper: 3.5.51  Built by: dr|z3d Platform: Linux amd64 6.8.9-1kaisen-amd64 Processor: coreibwl  Skylake Core i3/i5/i7  [Jcpuid version: 3] Java: N/A 21 (OpenJDK Runtime Environment 21+-adhoc.nixbld.source) Jetty: 9.3.30.v20211001 Servlet: Jasper JSP 2.3 Engine (3.1) JBigI: Native BigInteger library libjbigi-linux-coreibwl_64.so loaded from resource [version: 4] GMP: 6.1.2 JSTL: standard-taglib 1.2.0 Encoding: UTF-8 Charset: UTF-8

sha256sum i2p+ torrent downloaded: 736f38a5ac5121d33b7576cb1f61e6a9b5a28008b82795fdb31c7fb00dfd9b56

sha512sum i2p+ downloaded:

898866b715e8a32cd87d559a61d48b0d5c644d695807389f0d02bc87561cd949771e09c926df248cb422ca99b78c16dc70d375b2f64c42b4d3d70f631f29d29d

1