Recent comments

tb3k9d wrote

In China, this is already a criminal offence, while in Russia it is only partially so: ‘Using a VPN for criminal activities (fraud, illegal drug trafficking, etc.) is a criminal offence (punishable by imprisonment for up to 5 years).’ Other countries are currently only introducing document checks for access to adult content, but people are hacking VPNs, so it is likely that once the checks have been fine-tuned, they will introduce fines for circumvention, as in Russia, of $40 - 60 for each case. The circumvention itself and the existence of methods are unlikely to become criminal offences, except in certain circumstances.

1

minetest_i2p wrote (edited )

"getting I2P up and running is more of a challenge. It's not a deal-breaker, but it does require more technical know-how than the average user is likely to have."

Honestly I see this as a strength. It gives a barrier of entry to block out stupid asf normies such as the ones on Tor. Most people here are actually cool, I guarantee the seed/leech ratio on postmans tracker would be 1000% worse if it was as easy as Tor simply because normies ruin everything. also the people that run most of the biggest services here are easily reachable because of the smaller and more chill user base. I can fr just hit up notbob on irc or idk (probably postman as well but havent done that).

TL;DR Tor users are sux because there is not a barrier of entry.

3

bolvan wrote

Hi. I2P rulez, ya.

Can anybody tell my what's wrong with exit.stormycloud.i2p outproxy last week? Can not open many sites, unsable connection...

2

cumlord wrote

it's good to hear newcumers experience bc it exposes these sorts of weaknesses. i have some guides available that need to be reworked/organized anyway, would appreciate input or like topics you think important that's lacking http://simp.i2p/i2p-guide. didn't have one on eepsites since there's more than a few floating around. the "chat" tab will also let you ask questions on #i2p, which is the support channel for i2p (links to IRC2P) without JS or a proper IRC client setup.

2

johnbaconator wrote

I'm also pretty new to this I2P and invisible network thing but this place seems a lot more fun than tor. Every time I think of tor I think CP rings and drugs, but this place just makes me think of pre-2010 and IRC and shit. I even tried making my own eepsite with Blazor and tried making it look like it came straight out of 2000. Seems a lot more straightforward and simple on the frontend for setting up invisible services (just set up a tunnel and a port and now you have a unique link to use) but it takes a lot of dedication to keep maintained because the router also acts like a tor node.

2

z3d wrote (edited )

Here's an idea. Use an LLM, provide some general (fictional) details for the type of character you'd like to name, see what it churns out, and then pick one.

Here's an example response for the prompt "Please provide 20 imaginary aliases (nicknames) for a character that is interested in cryptography, anonymity and Mongolian culture."

 Cipher Khan
 Silent Steppe
 The Nomad Cipher
 Ghost of Genghis
 Code Rider
 Veiled Steppes
 Mongrel (Mongolia + Cipher)
 Shadow Hoard
 The Enigma Nomad
 White Horse Code
 Masked Mara
 Sky Whisperer
 Crypto Eagle
 Stealth Kurgan
 The Hidden Horde
 Tengri Key
 Cloak and Steppe
 GenghiCrypt
 Nomad Lock
 Windborne Cipher

Source: Qwen3-235B

2

c00kiepast3 wrote

I also use PAC Proxy method with this config. I deleted all of my whitelisted domains from the config.

function isYggdrasilIPv6(host) {
 host = host.replace(/^\[|\]$/g, "");
 var parts = host.split(":");
 if (parts.length < 2) return false;
 var first16 = parseInt(parts[0], 16);
 return first16 >= 0x200 && first16 <= 0x3FF;
}

function FindProxyForURL(url, host) {
 if (isYggdrasilIPv6(host)) {
 return "DIRECT";
 }

 if (dnsDomainIs(host, ".i2p")) {
 return "SOCKS5 192.168.1.X:4447";
 }

 if (dnsDomainIs(host, ".onion")) {
 return "SOCKS5 192.168.1.X:9050";
 }

 var whitelist = [
 ""
 ];

 for (var i = 0; i < whitelist.length; i++) {
 var domain = whitelist[i];
 if (host === domain || host.endsWith("." + domain)) {
 return "DIRECT";
 }
 }

 return "SOCKS5 192.168.1.X:9050";
}
4

pory wrote

I personally use a PAC proxy with regular Firefox to automatically switch between I2P for .i2p domains and Tor for everything else (including .onions)

function FindProxyForURL(url, host)
{
 if(host.match(/^(localhost|127[.]0[.]0[.]1|192[.]168[.]1[.]1)$/))
 return 'DIRECT';
 
 if (host.match(/[.]i2p$/))
 return 'HTTP 127.0.0.1:4444';

 return 'SOCKS5 127.0.0.1:9050';
}
1