Recent comments
bolvan wrote
Reply to A curious thing about tube.i2p by j8810kkw
- Site don't working with socks proxy. Must be http.
- I2pd sucks.
j8810kkw wrote (edited )
Reply to I2Music: Self hosted JS-free Music Player by cumlord
Project looks interesting. Is there a link to the demo? (NVM it's http://music.simp.i2p)
cumlord wrote
that is one intestine
not_bob wrote
That made my day. Thank you!
cumlord OP wrote
Reply to comment by Mulberry in I2Music: Self hosted JS-free Music Player by cumlord
thanks :)
righttoprivacy OP wrote
Reply to comment by libertas0ether in Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
I know they are working on their own OS and such. Could be disinfo.
But I won't bet my computer on it. ;)
Mulberry wrote
Reply to I2Music: Self hosted JS-free Music Player by cumlord
Cool project OP
libertas0ether wrote
Reply to Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
we're at a lvl far removed from the inner workings. evrything could be propaganda lies, west and east. the tidbit about "unknown encrypted data packets" triggering "pre-implanted backdoors" in windows is funny. thnk these are target based or exist widely on every windows installation? waiting for a neutral security auditor to find and expose?
i wonder what incentives lie in wait for such an auditor.. $$$ and recognition, or something more sinister
codrus wrote
Reply to The Stew Peters Network by Saint_Cuthbert
90% on target. 10% possibly off target.
codrus wrote
I forget what it is called, but AMD has their own version as well.
cumlord wrote (edited )
Reply to comment by blueraspberryesketimine in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
it probably could, to me that along with traffic analysis are things that fall more into state sponsored level attack. guess avoiding those chipsets is the way or disabling it, but only 3 people are going to do that. like i'd think that at least with intel it's basically a backdoor, probably would take a fair amount of effort for someone outside of them to exploit it. but i guess that doesn't stop intel from gathering intel, lol
there's a surprising amount of low-lying fruit that can be way easier to do for non state actors. Best to assume your ip address is known to be running i2p as public knowledge, and like just poking around the netdb will give info that can sometimes lead to deanon if not careful
blueraspberryesketimine OP wrote (edited )
Reply to comment by cumlord in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
I wonder how the intel management engine and AMD PSP could be used to track I2P users. They make up the majority of the nodes on this network. We really don't have a way to fight that unless we all jump to RISC-V right? Also, that article is interesting but incredibly outdated. It's from 2010. Id imagine the security posture of i2p has improved dramatically since then.
cumlord wrote
Reply to comment by blueraspberryesketimine in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
you should be able to set the port like z3d said and it'll only use that, dangerous to share obviously because port scanning could be done to identify from suspected ips
i think in theory this is probably true to an extent, we're getting into the realm of traffic analysis. There's some info on this on http://i2p-projekt.i2p/en/docs/how/threat-model
righttoprivacy wrote (edited )
Reply to comment by blueraspberryesketimine in I2P+ leaking onto clearnet somehow? by blueraspberryesketimine
As not_bob mentioned, it's useful.
I2P+ comes with feature rich console interface, one that also happens to be a great place for beginners to start out - doesn't mean users would need to keep the outproxy.
Some otherwise might not have opportunity to try outproxy (some lazy, some unsure how).
And having access to browse clearnet also means a user is more likely to keep an i2p browser (in turn, i2prouter) set up - this means more traffic for all of us. And that's good for all.
In this way, I'd say it's a win win, to have built in (by default, not required to keep).
blueraspberryesketimine wrote
Reply to comment by righttoprivacy in Hardware Backdoors: Intel Management Engine by righttoprivacy
The management engine cannot be completely disabled in intel chips that ship with it because some of the things it handles are required for the chip to actually work. Really, you are better served by getting a chip without a management engine. Most AMD chips have their own version of the intel management engine, so they aren't safe. ARM boards are usually a little safer but not all. All of the Apple chips have a technology very similar to management engine built in. I don't know about the RISC-V boards but they are borderline trash so far anyway so they aren't a great escape route either.
blueraspberryesketimine OP wrote (edited )
Reply to comment by z3d in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
incorrect. The port the relay uses to the outside world is random and not to be disclosed, and certainly never a fixed port posted on a ramble post. Also, this fails to address my question. products like the firewalla purple can phone home and keep track of all the connections made on the port I granted a firewall exception to. My question was whats stopping the companies behind these products (or even just he ISPs themselves) from linking all the connections people are making on I2P? They wouldn't know the content of the data being sent but they would be able to piece together the paths it took potentially leading to deanon.
cumlord OP wrote
Reply to comment by zzzi2p in Speedup serving content with I2PSnark with > 16 outbound tunnels by cumlord
i gave tuckit a "force_outbound_quantity = x" to get around it, that would be even better :)
zzzi2p wrote
I can fix the display so if it's over the limit it still shows correctly.
z3d wrote (edited )
There's no way to create an exception for i2p as the destinations vary.
Allow all inbound and outbound traffic on your configured TCP and UDP port indicated on http://127.0.0.1:7657/confignet#udpconfig in I2P+. You should expect that traffic to only be handled by your Java runtime. No other ports on I2P need to exposed publicly (in your firewall).
choclet89 wrote
Reply to comment by blueraspberryesketimine in I2P+ leaking onto clearnet somehow? by blueraspberryesketimine
Just if anyone finds this, the outproxy is disabled by default in i2pd.
da_shi_214365 wrote
cumlord wrote
Reply to comment by blueraspberryesketimine in Getting started in I2P by blueraspberryesketimine
i'm not completely sure but i'd hazard a guess that it could have something to do with i2p+ being more selective in it's peer profiling compared to i2pd and that java routers use different bids for NTCP2 and SSU2
emissary is super exciting, just kinda showed up out of nowhere
not_bob wrote
Reply to comment by blueraspberryesketimine in I2P+ leaking onto clearnet somehow? by blueraspberryesketimine
It's very useful to have a working outproxy. You will find many sites that are banned when you use Tor, but work just fine though an I2P outproxy.
But, remember to use one browser just for I2P. Never let it touch the normal clearnet. Going through an outproxy is fine though.
blueraspberryesketimine OP wrote
found it. theres an outproxy in i2p+ by default. Why would that be there? I thought the entire point was to keep traffic internal to the i2p network
not_bob wrote
Reply to comment by bolvan in A curious thing about tube.i2p by j8810kkw
i2pd offers a http proxy server, it works well.
i2pd is great, if you are ok with flat config files and no limits.