Recent comments
Yolli wrote
no map lcatose tolerance onto it. People in central asia and ME can not drink pure milk, so ayran is their only chance at survival. 🥛🐄
fintere_934fintere wrote
Reply to Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
Politically, cyberattacks have become a fundamental part of modern conflicts, targeting sensitive objectives in a strategic manner. China’s cyber offensive against the US is not solely about advanced technology, but largely driven by the desire to spy and monitor matters that might seem minor yet hold significant importance in the context of influence and control .
Yolli wrote
Reply to Soothing GIF by Wahaha
Whenever the Tesseract turns inside out my mind blows. How could one create such an animation in 3D modeling programs? Perhaps code is needed.
Yolli wrote
Reply to Abandoned internet cafe by Rambler
trashed
Yolli wrote
Reply to Relocated to Thailand and these are some pictures that I took that I like by PrettyThaiForAWhiteGuy
isnt Thailand at war now with Cambodia?
Yolli wrote
Reply to Meet Alice by not_bob
Do these ai image generators include watermarks in the images that can be used to identify the user who created it?
Yolli wrote
Reply to Subscribing to I2P RSS feeds by Caucus0909
For reading rss feeds there exists also the desktop application thunderbird. Configuring the network settings in thunderbird under manual proxy configuration / http proxy worked for me. Entering into 2 text fields {!ip-address of your i2p node in local network!} port number of http-proxy (4444 for example) worked. I do not know about other rss feed readers.
anna161 wrote
Reply to This movement has gone too far by Wahaha
Holy strawman
guidry wrote
Reply to Tails OS joins forces with Tor Project in merger by z3d
love it thx
guidry wrote
Reply to Google Account Without Real Phone Number by 0x45
i saw online read only phone once, or VOIP swap number possibility. but maybe we can also share fake account. Would need some for a cloud GPU PAAS project using google collab as a showcase
cumlord OP wrote
Reply to comment by aaa in PSA - I'm trying to give you clown porn, how to stop me by cumlord
it's the same thing notbob is doing from notbobs post wrote about it some here:
- http://simp.i2p/blog/0026-14-07-2025-Notbob%20hits%201000%20posts%21%20NetDb%20Sniffing
- http://simp.i2p/blog/0016-18-03-2025-Tunnel%20counts%2C%20Crawling%20for%20unregistered%20eepsites
encrypted leaseset for stuff you don't want found and making sure auth is enabled with the biglybt webui are the best ways (or disabling the webui)
any leaseset is stored in the netdb, and the netdb is stored by floodfills. if you run a floodfill you can watch the leasesets come in from peers and try them with a scanning tool. in practice and even with only a router or 2 designated for this you can scan a majority of the steadily available content in i2p that isn't registered within a week or 2 probably
cumlord wrote (edited )
Reply to comment by aaa in NetDB sniffing - For fun and no profit by not_bob
if you have any server tunnel that you want to be accessible publicly as a service it will be picked up like this. for stuff you don't want to be public to the network, you have some options:
- encrypted leasesets
- whitelist a list of b32s
- dummy content on port 80 with the "real" thing on a random port
- auth
aaa wrote
Can you explain what you're doing in more detail and advise how to protect yourself from it?
aaa wrote
Reply to NetDB sniffing - For fun and no profit by not_bob
How can I test if a service I'm running is vulnerable to what ever you're doing? (I'm new to self hostng/networking)
aaa wrote
Reply to Google Account Without Real Phone Number by 0x45
Pretty sure you don't need a number when signing up on a chromebook, never tried it myself but heard of people buying cheap ones just to create gmails.
SquishyPillow wrote
Reply to This Snapchat Al just tried to gaslight me by RedTheOG
so very sillyyyyyyyyy
j8810kkw OP wrote
Reply to comment by j8810kkw in A curious thing about tube.i2p by j8810kkw
Chronic, I was actually thinking along the lines of actually making a new place to share video content. This one feels like a great slate to start on it. Well yeah, technically you can "import" YouTube videos and stuff. The project also has a production demo on https://tube.mills.io/. Check it out
j8810kkw wrote
Reply to NetDB sniffing - For fun and no profit by not_bob
I thought about such stuff to be possible on I2P, but I never got to the point of absolutely doing it on practice.
not_bob OP wrote
Reply to comment by paw_slut in NetDB sniffing - For fun and no profit by not_bob
I am not.
paw_slut wrote
Reply to NetDB sniffing - For fun and no profit by not_bob
Serious question. Are you the guy who probed around in Foxdick Chan's server a couple years ago?
not_bob wrote
Reply to comment by cumlord in Announcing drop.i2p: A Secure & Encrypted Image/Pastebin Service by stormycloudorg
Cake was in working from March of 2021 and stopped working on May of 2025. It had a very good run and was a very useful tool. I'm sad that it's gone.
not_bob wrote
Reply to Is Dread's I2P mirror still up? by Zeroday
That site has been down for quite a while now. I don't expect it to come back up.
NapkinBlizzard wrote (edited )
Reply to Is Dread's I2P mirror still up? by Zeroday
No, it's not just you. See this thread.
I do not trust the i2p network enough anymore. The bloom filter issue caused me to need to burn a whole lot of servers which I would have rather not needed to do. Issues come up but with arti beginning to be production ready the Tor network will only get even stronger.
M0rk wrote
Reply to 獨裁綠黨萬年總召柯建銘隱秘事 連載三 by stevechen
還有更新嗎
bengalthe3rd wrote
Reply to Surf the web safely with Kicksecure OS by kicksecure
I use linux mint 22