Recent comments
HumblePirate wrote
Reply to New Linux Rootkit by z3d
Well finding a zero day and fixing it, selling the solution is a smart way to not only build credibility but also make some $
Unbanned wrote
Reply to comment by Charlie in Google will block sideloading of unverified Android apps starting next year by sovereign
True, more phones need to support custom operating systems because Android is getting worse and worse.
Charlie wrote
Custom os are almost necessary at this point problem is the devices that support lineageos and the such are far and few between
Unbanned wrote
Needless to say, I think everyone on i2p knows how bad this is. It is time to move to GrapheneOS.
HumblePirate wrote
Reply to comment by ViFlud in Linux 6.16 Kernel released by ViFlud
sad but true.
HumblePirate wrote
Reply to comment by z3d in Finding a new secure handle by edgelord420
interesting
HumblePirate wrote
Based mises.org post. Taxation is theft End the fed Buy Bitcoin
HumblePirate wrote
Reply to comment by minetest_i2p in My First Look into I2P by RogueHashrate
True dat
tb3k9d wrote
Reply to comment by rngsus in New Russian law criminalizes online searches for controversial content by z3d
In China, this is already a criminal offence, while in Russia it is only partially so: ‘Using a VPN for criminal activities (fraud, illegal drug trafficking, etc.) is a criminal offence (punishable by imprisonment for up to 5 years).’ Other countries are currently only introducing document checks for access to adult content, but people are hacking VPNs, so it is likely that once the checks have been fine-tuned, they will introduce fines for circumvention, as in Russia, of $40 - 60 for each case. The circumvention itself and the existence of methods are unlikely to become criminal offences, except in certain circumstances.
minetest_i2p wrote
So purdy
minetest_i2p wrote
Reply to The Privacy Paradox that Never Was by sovereign
99% sure that every user of i2p knows this, also this looks like a bot made it.
minetest_i2p wrote (edited )
Reply to My First Look into I2P by RogueHashrate
"getting I2P up and running is more of a challenge. It's not a deal-breaker, but it does require more technical know-how than the average user is likely to have."
Honestly I see this as a strength. It gives a barrier of entry to block out stupid asf normies such as the ones on Tor. Most people here are actually cool, I guarantee the seed/leech ratio on postmans tracker would be 1000% worse if it was as easy as Tor simply because normies ruin everything. also the people that run most of the biggest services here are easily reachable because of the smaller and more chill user base. I can fr just hit up notbob on irc or idk (probably postman as well but havent done that).
TL;DR Tor users are sux because there is not a barrier of entry.
pory wrote
Reply to comment by c00kiepast3 in How to access .onion sites from I2P? by invertedlurker
This is much cleaner, thanks!
bolvan wrote
Reply to My First Look into I2P by RogueHashrate
Hi. I2P rulez, ya.
Can anybody tell my what's wrong with exit.stormycloud.i2p outproxy last week? Can not open many sites, unsable connection...
cumlord wrote
Reply to My First Look into I2P by RogueHashrate
it's good to hear newcumers experience bc it exposes these sorts of weaknesses. i have some guides available that need to be reworked/organized anyway, would appreciate input or like topics you think important that's lacking http://simp.i2p/i2p-guide. didn't have one on eepsites since there's more than a few floating around. the "chat" tab will also let you ask questions on #i2p, which is the support channel for i2p (links to IRC2P) without JS or a proper IRC client setup.
cumlord wrote
Reply to comment by invertedlurker in How to access .onion sites from I2P? by invertedlurker
little late but glad you got it figured out, i've made that same mistake lol
johnbaconator wrote
Reply to My First Look into I2P by RogueHashrate
I'm also pretty new to this I2P and invisible network thing but this place seems a lot more fun than tor. Every time I think of tor I think CP rings and drugs, but this place just makes me think of pre-2010 and IRC and shit. I even tried making my own eepsite with Blazor and tried making it look like it came straight out of 2000. Seems a lot more straightforward and simple on the frontend for setting up invisible services (just set up a tunnel and a port and now you have a unique link to use) but it takes a lot of dedication to keep maintained because the router also acts like a tor node.
rngsus wrote
I bet you'll see similar laws in other nations before the decade is over. How long till using a VPN or having tor/i2p/freenet type tools is criminal?
RogueHashrate OP wrote
Reply to comment by R_N in My First Look into I2P by RogueHashrate
Thank you kindly :)
R_N wrote
Reply to My First Look into I2P by RogueHashrate
Welcome. :)
j8810kkw OP wrote
Reply to comment by ded_eban in A little self-hosted Yarn Instance by j8810kkw
sorry about that. It's not hosted 24/7.
Yolli wrote
Can starlink be used to track (specific) users? I think users in the empty oceans will stick out. The position of the satellite around the globe is known to them, and the data streams can be observed as well, can't they?
Yolli wrote
Reply to comment by ManMan in Removal of Russian coders spurs debate about Linux kernel’s politics by z3d
Linus Torwalds is the projects "Benevolent Dictator for Live" BDfL. In the end he makes the final call I guess.
z3d wrote (edited )
Reply to Finding a new secure handle by edgelord420
Here's an idea. Use an LLM, provide some general (fictional) details for the type of character you'd like to name, see what it churns out, and then pick one.
Here's an example response for the prompt "Please provide 20 imaginary aliases (nicknames) for a character that is interested in cryptography, anonymity and Mongolian culture."
Cipher Khan
Silent Steppe
The Nomad Cipher
Ghost of Genghis
Code Rider
Veiled Steppes
Mongrel (Mongolia + Cipher)
Shadow Hoard
The Enigma Nomad
White Horse Code
Masked Mara
Sky Whisperer
Crypto Eagle
Stealth Kurgan
The Hidden Horde
Tengri Key
Cloak and Steppe
GenghiCrypt
Nomad Lock
Windborne Cipher
Source: Qwen3-235B
w33d3rl1ng wrote
Reply to comment by j8810kkw in Are solar panels so cool? by ded_eban
they are good for both use cases ... I and my friends use similar panels for the household, but I know a lot companies in Germany, who use it for their purposes as well and they are satisfied ... of course for industrial purposes you need more panels and such which can collect enough power