Recent comments

w33d3rl1ng wrote

Reply to comment by j8810kkw in Are solar panels so cool? by ded_eban

they are good for both use cases ... I and my friends use similar panels for the household, but I know a lot companies in Germany, who use it for their purposes as well and they are satisfied ... of course for industrial purposes you need more panels and such which can collect enough power

1

HumblePirate wrote

Reply to New Linux Rootkit by z3d

Well finding a zero day and fixing it, selling the solution is a smart way to not only build credibility but also make some $

1

tb3k9d wrote

In China, this is already a criminal offence, while in Russia it is only partially so: ‘Using a VPN for criminal activities (fraud, illegal drug trafficking, etc.) is a criminal offence (punishable by imprisonment for up to 5 years).’ Other countries are currently only introducing document checks for access to adult content, but people are hacking VPNs, so it is likely that once the checks have been fine-tuned, they will introduce fines for circumvention, as in Russia, of $40 - 60 for each case. The circumvention itself and the existence of methods are unlikely to become criminal offences, except in certain circumstances.

1

minetest_i2p wrote (edited )

"getting I2P up and running is more of a challenge. It's not a deal-breaker, but it does require more technical know-how than the average user is likely to have."

Honestly I see this as a strength. It gives a barrier of entry to block out stupid asf normies such as the ones on Tor. Most people here are actually cool, I guarantee the seed/leech ratio on postmans tracker would be 1000% worse if it was as easy as Tor simply because normies ruin everything. also the people that run most of the biggest services here are easily reachable because of the smaller and more chill user base. I can fr just hit up notbob on irc or idk (probably postman as well but havent done that).

TL;DR Tor users are sux because there is not a barrier of entry.

3

bolvan wrote

Hi. I2P rulez, ya.

Can anybody tell my what's wrong with exit.stormycloud.i2p outproxy last week? Can not open many sites, unsable connection...

2

cumlord wrote

it's good to hear newcumers experience bc it exposes these sorts of weaknesses. i have some guides available that need to be reworked/organized anyway, would appreciate input or like topics you think important that's lacking http://simp.i2p/i2p-guide. didn't have one on eepsites since there's more than a few floating around. the "chat" tab will also let you ask questions on #i2p, which is the support channel for i2p (links to IRC2P) without JS or a proper IRC client setup.

2

johnbaconator wrote

I'm also pretty new to this I2P and invisible network thing but this place seems a lot more fun than tor. Every time I think of tor I think CP rings and drugs, but this place just makes me think of pre-2010 and IRC and shit. I even tried making my own eepsite with Blazor and tried making it look like it came straight out of 2000. Seems a lot more straightforward and simple on the frontend for setting up invisible services (just set up a tunnel and a port and now you have a unique link to use) but it takes a lot of dedication to keep maintained because the router also acts like a tor node.

2

z3d wrote (edited )

Here's an idea. Use an LLM, provide some general (fictional) details for the type of character you'd like to name, see what it churns out, and then pick one.

Here's an example response for the prompt "Please provide 20 imaginary aliases (nicknames) for a character that is interested in cryptography, anonymity and Mongolian culture."

 Cipher Khan
 Silent Steppe
 The Nomad Cipher
 Ghost of Genghis
 Code Rider
 Veiled Steppes
 Mongrel (Mongolia + Cipher)
 Shadow Hoard
 The Enigma Nomad
 White Horse Code
 Masked Mara
 Sky Whisperer
 Crypto Eagle
 Stealth Kurgan
 The Hidden Horde
 Tengri Key
 Cloak and Steppe
 GenghiCrypt
 Nomad Lock
 Windborne Cipher

Source: Qwen3-235B

2