Recent comments

c00kiepast3 wrote

I also use PAC Proxy method with this config. I deleted all of my whitelisted domains from the config.

function isYggdrasilIPv6(host) {
 host = host.replace(/^\[|\]$/g, "");
 var parts = host.split(":");
 if (parts.length < 2) return false;
 var first16 = parseInt(parts[0], 16);
 return first16 >= 0x200 && first16 <= 0x3FF;
}

function FindProxyForURL(url, host) {
 if (isYggdrasilIPv6(host)) {
 return "DIRECT";
 }

 if (dnsDomainIs(host, ".i2p")) {
 return "SOCKS5 192.168.1.X:4447";
 }

 if (dnsDomainIs(host, ".onion")) {
 return "SOCKS5 192.168.1.X:9050";
 }

 var whitelist = [
 ""
 ];

 for (var i = 0; i < whitelist.length; i++) {
 var domain = whitelist[i];
 if (host === domain || host.endsWith("." + domain)) {
 return "DIRECT";
 }
 }

 return "SOCKS5 192.168.1.X:9050";
}
4

pory wrote

I personally use a PAC proxy with regular Firefox to automatically switch between I2P for .i2p domains and Tor for everything else (including .onions)

function FindProxyForURL(url, host)
{
 if(host.match(/^(localhost|127[.]0[.]0[.]1|192[.]168[.]1[.]1)$/))
 return 'DIRECT';
 
 if (host.match(/[.]i2p$/))
 return 'HTTP 127.0.0.1:4444';

 return 'SOCKS5 127.0.0.1:9050';
}
1

lina wrote

i believe similar laws are introduced only because the current parents are unable to limit their kids computer access. similar laws weren't needed in 90s because everyone's parent taken good care of their kids and limited how much screen time they had. Of Course there are some people who didn't have such parents but everywhere are exceptions. Just since parents don't have time to take care of their kids they just given up on actually parenting then politicians use similar laws as trojan horse to more censorship

heres the circle: corporations want more money so they raise the cost of their products(houses etc...) -> people want to buy such products but dont have enough money for it -> start working in multiple jobs -> not enough time to parent&raise kids -> politicians make laws that censor internet so kids stay safe(in theory) -> leads to censorship, abuse of power, then banning critics -> less regulation for companies passes because people dont know actual the truth -> more money for corporations -> time for another circle?

3

Saint_Cuthbert wrote

One thing that I would like to note is that the government(s) is largely content to watch unlawful behavior and do nothing. The law enforcement in one place I used to live used (likely and/or certainly) stingrays (probably) and radars (certainly) to watch people inside their homes. There were plenty of people they could have gone after for various offenses ranging from speeding to drug manufacture, but they rarely used their surveillance capabilities to do anything about those crimes.

In the US, the federal agencies have required the serialization of firearms, the registration of certain firearms, and also keep track of people's credit card purchase history of create a de-facto registry based on what bullets people buy. They would be hard pressed to do anything about firearm ownership in general in that part of the world, but they are keen on tracking what people have to make selective confiscation easier. They may not "come for your guns" unless you give them a reason, such as using medical marijuana or having PTSD. This would allow easing toward a Europe-style government control of all firearms and the death of any guarantee of freedom.

The age verification law in the UK is likely for the purpose of identifying opposition and using zersetzung-style tactics to cracking down on those who oppose them. http://wikiless.i2p/wiki/zersetzung?lang=en In the past they have been content to simply imprison those who organize the opposition.

1

Matrix_phoenix wrote

Reply to comment by ViFlud in Linux 6.16 Kernel released by ViFlud

Just keep trying to get friends and family to leave an I2p router running on their computer.

Then as long as people have a router running you can have them open the browser you set up for them for i2p, and use things like this forum, or making some websites for each other, or using the messengers here.

1

ViFlud OP wrote (edited )

the online forum is very small and no one will probably read it

It's a shame, I'm new to i2p but it seems to me that this is the ideal internet with top-level anonymity lol.

1

j8810kkw wrote (edited by a moderator )

I don't know about that part, I think that though they may be good for the household they're not good for things in the industrial scale (which is also my concern). And that part about the poisonous stuff? I think I'll do some research on it and bring back what I can find. Thanks though for bringing up the topic.

1

invertedlurker OP wrote

So I'm coming back, and I actually figured it out. Somehow, there was an instance of I2Pd that was set to run on startup with root privileges. "sudo lsof -i:4444" was what it took to find it. because I didn't think about using lsof with sudo. I killed that instance and also uninstalled I2Pd, to not have problems like that again, and because I never use it anyways. Yeah, you're right.

2

invertedlurker OP wrote (edited )

It never was disabled in the first place. But I added all these outproxies as you suggested. Still nothing. geez I wish I could show you pictures to make sure I'm not doing it wrong.

(also why is the title of every failed access "I2Pd HTTP proxy" ? I'm not using it as far as I know)

By the way here are the startup logs of the tunnel. Port 4444 fails, that might be why

<div>
• Client ready ➜ Listening on 127.0.0.1:7659
• Tunnels ready for client [Standard client on 127.0.0.1:7659]
• Client ready ➜ Listening on 127.0.0.1:4445
• Tunnels ready for client [HTTPS Proxy on 127.0.0.1:4445]
• Client ready ➜ Listening on 127.0.0.1:7660
• Tunnels ready for client [Standard client on 127.0.0.1:7660]
• Stopping client IRC Client on 127.0.0.1:6668…
• Error listening for connections on /127.0.0.1 port 6668: java.net.BindException: Address already used
• Stopping client HTTP Proxy on 127.0.0.1:4444…
• Error listening for connections on /127.0.0.1 port 4444: java.net.BindException: Address already used
</div>

Translated from French because even though I set English, network errors are in my language.

1

z3d wrote

If you disabled the default configured outproxy in your HTTP Proxy Client tunnel, you won't be able to access clearnet or .onion sites. In your HTTP Proxy tunnel, restore the purokishi.i2p outproxy for HTTP and HTTPS if you wish to access .onion sites over .i2p. You can configure multiple outproxies if you want some random variation, e.g. purokishi.i2p,exit.stormycloud.i2p,outproxy.acetone.i2p.

2