Recent comments
j8810kkw wrote (edited by a moderator )
Reply to Are solar panels so cool? by ded_eban
I don't know about that part, I think that though they may be good for the household they're not good for things in the industrial scale (which is also my concern). And that part about the poisonous stuff? I think I'll do some research on it and bring back what I can find. Thanks though for bringing up the topic.
invertedlurker OP wrote
Reply to comment by cumlord in How to access .onion sites from I2P? by invertedlurker
So I'm coming back, and I actually figured it out. Somehow, there was an instance of I2Pd that was set to run on startup with root privileges. "sudo lsof -i:4444" was what it took to find it. because I didn't think about using lsof with sudo. I killed that instance and also uninstalled I2Pd, to not have problems like that again, and because I never use it anyways. Yeah, you're right.
cumlord wrote
Reply to comment by invertedlurker in How to access .onion sites from I2P? by invertedlurker
guessing ports 4444 and 6668 are in use already, any chance another router is running somehow? id figure out what's running those ports and/or change them
invertedlurker OP wrote (edited )
Reply to comment by z3d in How to access .onion sites from I2P? by invertedlurker
It never was disabled in the first place. But I added all these outproxies as you suggested. Still nothing. geez I wish I could show you pictures to make sure I'm not doing it wrong.
(also why is the title of every failed access "I2Pd HTTP proxy" ? I'm not using it as far as I know)
By the way here are the startup logs of the tunnel. Port 4444 fails, that might be why
<div>
• Client ready ➜ Listening on 127.0.0.1:7659
• Tunnels ready for client [Standard client on 127.0.0.1:7659]
• Client ready ➜ Listening on 127.0.0.1:4445
• Tunnels ready for client [HTTPS Proxy on 127.0.0.1:4445]
• Client ready ➜ Listening on 127.0.0.1:7660
• Tunnels ready for client [Standard client on 127.0.0.1:7660]
• Stopping client IRC Client on 127.0.0.1:6668…
• Error listening for connections on /127.0.0.1 port 6668: java.net.BindException: Address already used
• Stopping client HTTP Proxy on 127.0.0.1:4444…
• Error listening for connections on /127.0.0.1 port 4444: java.net.BindException: Address already used
</div>
Translated from French because even though I set English, network errors are in my language.
z3d wrote
Reply to How to access .onion sites from I2P? by invertedlurker
If you disabled the default configured outproxy in your HTTP Proxy Client tunnel, you won't be able to access clearnet or .onion sites. In your HTTP Proxy tunnel, restore the purokishi.i2p outproxy for HTTP and HTTPS if you wish to access .onion sites over .i2p. You can configure multiple outproxies if you want some random variation, e.g. purokishi.i2p,exit.stormycloud.i2p,outproxy.acetone.i2p.
JupiterMarket wrote
Reply to Google Account Without Real Phone Number by 0x45
Buy a cheap prepaid sim?
bengalthe3rd wrote
Reply to Surf the web safely with Kicksecure OS by kicksecure
I use linux mint 22
fintere_934fintere wrote
Reply to Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks by righttoprivacy
Politically, cyberattacks have become a fundamental part of modern conflicts, targeting sensitive objectives in a strategic manner. China’s cyber offensive against the US is not solely about advanced technology, but largely driven by the desire to spy and monitor matters that might seem minor yet hold significant importance in the context of influence and control .
Yolli wrote
Reply to Abandoned internet cafe by Rambler
trashed
Yolli wrote
Reply to Relocated to Thailand and these are some pictures that I took that I like by PrettyThaiForAWhiteGuy
isnt Thailand at war now with Cambodia?
Yolli wrote
Reply to Meet Alice by not_bob
Do these ai image generators include watermarks in the images that can be used to identify the user who created it?
Yolli wrote
Reply to Subscribing to I2P RSS feeds by Caucus0909
For reading rss feeds there exists also the desktop application thunderbird. Configuring the network settings in thunderbird under manual proxy configuration / http proxy worked for me. Entering into 2 text fields {!ip-address of your i2p node in local network!} port number of http-proxy (4444 for example) worked. I do not know about other rss feed readers.
anna161 wrote
Reply to This movement has gone too far by Wahaha
Holy strawman
guidry wrote
Reply to Tails OS joins forces with Tor Project in merger by z3d
love it thx
guidry wrote
Reply to Google Account Without Real Phone Number by 0x45
i saw online read only phone once, or VOIP swap number possibility. but maybe we can also share fake account. Would need some for a cloud GPU PAAS project using google collab as a showcase
cumlord OP wrote
Reply to comment by aaa in PSA - I'm trying to give you clown porn, how to stop me by cumlord
it's the same thing notbob is doing from notbobs post wrote about it some here:
- http://simp.i2p/blog/0026-14-07-2025-Notbob%20hits%201000%20posts%21%20NetDb%20Sniffing
- http://simp.i2p/blog/0016-18-03-2025-Tunnel%20counts%2C%20Crawling%20for%20unregistered%20eepsites
encrypted leaseset for stuff you don't want found and making sure auth is enabled with the biglybt webui are the best ways (or disabling the webui)
any leaseset is stored in the netdb, and the netdb is stored by floodfills. if you run a floodfill you can watch the leasesets come in from peers and try them with a scanning tool. in practice and even with only a router or 2 designated for this you can scan a majority of the steadily available content in i2p that isn't registered within a week or 2 probably
cumlord wrote (edited )
Reply to comment by aaa in NetDB sniffing - For fun and no profit by not_bob
if you have any server tunnel that you want to be accessible publicly as a service it will be picked up like this. for stuff you don't want to be public to the network, you have some options:
- encrypted leasesets
- whitelist a list of b32s
- dummy content on port 80 with the "real" thing on a random port
- auth
aaa wrote
Can you explain what you're doing in more detail and advise how to protect yourself from it?
aaa wrote
Reply to NetDB sniffing - For fun and no profit by not_bob
How can I test if a service I'm running is vulnerable to what ever you're doing? (I'm new to self hostng/networking)
aaa wrote
Reply to Google Account Without Real Phone Number by 0x45
Pretty sure you don't need a number when signing up on a chromebook, never tried it myself but heard of people buying cheap ones just to create gmails.
SquishyPillow wrote
Reply to This Snapchat Al just tried to gaslight me by RedTheOG
so very sillyyyyyyyyy
j8810kkw OP wrote
Reply to comment by j8810kkw in A curious thing about tube.i2p by j8810kkw
Chronic, I was actually thinking along the lines of actually making a new place to share video content. This one feels like a great slate to start on it. Well yeah, technically you can "import" YouTube videos and stuff. The project also has a production demo on https://tube.mills.io/. Check it out
j8810kkw wrote
Reply to NetDB sniffing - For fun and no profit by not_bob
I thought about such stuff to be possible on I2P, but I never got to the point of absolutely doing it on practice.
not_bob OP wrote
Reply to comment by paw_slut in NetDB sniffing - For fun and no profit by not_bob
I am not.
ded_eban wrote
Reply to A little self-hosted Yarn Instance by j8810kkw
dead link