Recent comments

fintere_934fintere wrote

Politically, cyberattacks have become a fundamental part of modern conflicts, targeting sensitive objectives in a strategic manner. China’s cyber offensive against the US is not solely about advanced technology, but largely driven by the desire to spy and monitor matters that might seem minor yet hold significant importance in the context of influence and control .

1

Yolli wrote

Reply to Soothing GIF by Wahaha

Whenever the Tesseract turns inside out my mind blows. How could one create such an animation in 3D modeling programs? Perhaps code is needed.

1

Yolli wrote

Reply to Meet Alice by not_bob

Do these ai image generators include watermarks in the images that can be used to identify the user who created it?

1

Yolli wrote

For reading rss feeds there exists also the desktop application thunderbird. Configuring the network settings in thunderbird under manual proxy configuration / http proxy worked for me. Entering into 2 text fields {!ip-address of your i2p node in local network!} port number of http-proxy (4444 for example) worked. I do not know about other rss feed readers.

1

guidry wrote

i saw online read only phone once, or VOIP swap number possibility. but maybe we can also share fake account. Would need some for a cloud GPU PAAS project using google collab as a showcase

1

cumlord OP wrote

it's the same thing notbob is doing from notbobs post wrote about it some here:

encrypted leaseset for stuff you don't want found and making sure auth is enabled with the biglybt webui are the best ways (or disabling the webui)

any leaseset is stored in the netdb, and the netdb is stored by floodfills. if you run a floodfill you can watch the leasesets come in from peers and try them with a scanning tool. in practice and even with only a router or 2 designated for this you can scan a majority of the steadily available content in i2p that isn't registered within a week or 2 probably

1

cumlord wrote (edited )

if you have any server tunnel that you want to be accessible publicly as a service it will be picked up like this. for stuff you don't want to be public to the network, you have some options:

  • encrypted leasesets
  • whitelist a list of b32s
  • dummy content on port 80 with the "real" thing on a random port
  • auth
2

NapkinBlizzard wrote (edited )

No, it's not just you. See this thread.

/u/Paris:

I do not trust the i2p network enough anymore. The bloom filter issue caused me to need to burn a whole lot of servers which I would have rather not needed to do. Issues come up but with arti beginning to be production ready the Tor network will only get even stronger.

1