Recent comments
kuro wrote (edited )
Reply to comment by chatrouge in I live in Russia, ask your questions. by d1esel
He clearly lied about the police. If you want to know how things really are, here are some websites in English:
- thebarentsobserver.com (I know the editors, some of them are from Russia)
- meduza.io/en
- en.zona.media
- themoscowtimes.com
- ovd.info/en
- novayagazeta.eu
cumlord wrote
Reply to by !deleted2204
give us an idea of what the ram/cpu limits are
smallcat wrote
Reply to My First Look into I2P by RogueHashrate
For me, the experience having tested i2p and tor I wonder why this is so unknown. We all need privacy after all. Also once you have the client it's pretty easy to use if you have basic tech skills (like knowing how to setup a proxy in your browser). I tried using outproxies for ease use (it's kinda annoying having to go back and forth from another window or browser to go to clearnet stuff) but I acknowledge tor is better for that and intended for it.
jackal wrote (edited )
Reply to Can we trust the Tor Foundation? by Unbanned
Can we trust the Tor Foundation?
tldr: The Tor Foundation can't be trusted, the Tor network however can be trusted so long as you use it properly.
No, or at least that's what their public relations are telling me. They've been pushing hard to turn Tor into something else than an actual darknet. They keep pushing to turn the Tor network into a VPN to access clearnet "privately or anonymously" which makes less and less sense as time goes on.
Tor should be used the same way I2P is, privacy and anonymity exist so long you don't touch exit nodes or outproxies, and it seems their effort is more aimed at making sure people do not make the network bigger but rather they just use it as a VPN proxy for clearnet.
On the topic these videos discuss, it seems like all of these issues have to do precisely with the misuse of Tor as a proxy/VPN solution rather than as a darknet, I got a small comment on the useragent spoofing thing, though, that one seems sketchy, really sketchy, and apparently everyone involved seems to be throwing back bullshit reasons to justify why not even general.useragent.override is working (as I realized a moment ago).
jackal wrote (edited )
Privacy in the real world has less to do with buying fancy gadgets and more to do with habits and what kind of clothing you wear.
An few obvious suggestions are that you wear hats and sunglasses when outside, trucker hats are widespread and make you harder to identify, they're a good choice to obfuscate your face while not drawing too much attention, if you wear or use IR devices which will deliberately tamper or make identification harder you will draw a lot of attention, those should be reserved for riots or similar scenarios where confrontation is expected, not for daily use. Along with this suggestion comes another good one of avoiding "eye contact" with surveillance cameras; whenever you enter a public spaces and buildings or a big private business, always assume you're being surveilled, don't look for cameras because if you can see them clearly they can also see your face features, Luigi Mangione got easily identified because he did this exact mistake, multiple times, even though he did try to obfuscate his face.
On the corporates collecting your data to study your purchase habits you can always pay on cash and refuse to pay with a credit or debit card, or a phone, because they (both businesses and banks) will use those transactions to guess your income and how much you spend and where, never buy anything on a business that doesn't accept cash, even if they accept cryptos which I doubt you'll find any, always buy in cash. If a business such as a supermarket offers you discounts with a membership card you can try to cheat the system by providing fake names and identities if they ask for one, if they do not allow an anonymous member card then you can assume those discounts are being paid with your purchase habits and you're giving your consent if you accept them, so reject those discounts at all times if possible.
Another good suggestion and more on the hardcore side is to never, ever tattoo yourself, and if you have tattoos that are on visible places such as arms or legs consider covering them or ideally getting rid of them. Cops love tattoos, because they're akin to fingerprints that can be used to consistently identify people even if they cover their faces.
Trifocal wrote
You make an excellent point. I don't suppose you can just buy glasses or hats with IR illuminators?
fgFUKTG445F OP wrote
Reply to comment by johnbaconator in Proposal: a new live OS for I2P by fgFUKTG445F
some people don't have a strong PC to use a virtual machine effectively and some people don't want to use there own computer to browse I2p and I used tails with I2p but it's not that effective to use and you need to connect to TOR which is not the best network for speed and you know the news about TOR and the USA and Europe and stuff like that.
fgFUKTG445F OP wrote
Reply to Proposal: a new live OS for I2P by fgFUKTG445F
Hi. I'm back. sorry for being late. I have some stuff todo . and after some researching my stuff about my live os . it's mid and a$$ and I saw A lot of other live os like prestium and Obscurix (an arch based distro) and other distros and I decided to maybe to cancel my idea.
r34p3r wrote
Reply to comment by righttoprivacy in Onion Mail by privacy_is_dead
i couldn't able open this link http://tube.i2p/watch?v=js7ldFYZelk. it's saying "Website Not Found in Addressbook". i'm new to 12p just created this account.
jackal wrote
Reply to comment by Saint_Cuthbert in Tor Browser on mobile by Gambino9
Will there be a choice to opt-out? Yeah, you'll probably get a button somewhere to express that you don't want to be spied at least if you're in Europe. Will there be any auditable method for them to prove that they do respect consent? Nope, they never truly cared about consent in the first place if they make these opt-out rather than opt-in, mostly because they know that if this was opt-in most people wouldn't use it as it doesn't benefit them.
The problem is that this software is proprietary, the phones are proprietary and they give far more control to Google, Apple, Samsung and manufacturers than users, that's exactly why we have the privacy and security nightmare we have today with smartphones, and they're trying the same moves on computers as well, albeit with less success.
Where could I research this matter further?
See every single top-notch/latest flagship smartphone being announced from any major brand: Samsung, Google and Apple are all selling local AI assistant as a feature on these upcoming phones.
Saint_Cuthbert wrote
Reply to comment by jackal in Tor Browser on mobile by Gambino9
Would there be an opt-out? Can those privacy violations be mitigated, or should we all just go back to using landlines? Where could I research this matter further?
SmugCuck wrote
Reply to Tor Browser on mobile by Gambino9
I would guess based on aspect ratio and OS info you would definitely stick out from an already "small" crowd of tor users.
j8810kkw wrote
If such would be inevitable, I will not buy a new gen Android device.
jackal wrote
Reply to Tor Browser on mobile by Gambino9
Tldr: Unless your phone is running Lineage, Graphene or similar, without Google/Facebook and such spyware you do not have privacy nor security.
The long explanation is that it depends on the phone and what operating system is running, a stock Android experience is not private nor secure by design so if you're doing something that could get you in trouble with the government you will want to do such on a proper computer running Linux. On the latest and upcoming phones surveillance is gonna get worse than merely big tech getting some telemetry data and profiling shenanigans, upcoming phones will have hardware acceleration to make LLMs and AI power efficient, they definitely can and will snoop through your shit 24/7, taking screenshots or even screen recording, piping them through the algorithm and sending the digested data directly to their servers, with high accuracy and bypassing computational constraints because your phone's hardware will be doing the heavy lifting.
cumlord wrote (edited )
Reply to comment by dev in Recommended web technologies for I2P and Tor projects by dev
yea use what you're gonna be most productive with. i2p+ has a good throttle/filter system that helps a lot, not a lot of problems because of that, but like if you try to host a wordpress site here with i2pd you're gonna have a bad time
sort of fun challenge for me to try doing stuff without js, depends what you wanna do though, but get pretty far using some combination of frames refresh and cookies. http://simp.i2p/chat is jank, no doubt, but, no js needed lmao. possibly relevant to your security outfit, the chat page http://simp.i2p/botcheck attempts to do a bot challenge with css. unless you're specifically worried about bot spam that's completely unnecessary, just giving some ideas for stuff that can be done without js
lots of neat css tricks out there, like http://simp.i2p/search the styled dropdown is a checkbox, and http://gatheryourparty.i2p has a star rating on the posts but the stars are radio buttons. snex has that one setup with a ruby backend
not so familiar with those ecosystems, but think it's a little slower getting started like this but once you've got some templates it gets faster ;)
Alfgz wrote
Reply to Proposal: a new live OS for I2P by fgFUKTG445F
Interesting
dev OP wrote
Reply to comment by rav in Recommended web technologies for I2P and Tor projects by dev
Are you sure this JSX template not gonna generate any JS on client side? I have a doubt about it :)
rav wrote
Reply to comment by dev in Recommended web technologies for I2P and Tor projects by dev
i forgot to mention this in the first post but i recommended hono because you can use jsx for templating https://hono.dev/docs/guides/jsx for hosting you should deno or bun instead of node. you might get better performence
jackal wrote
You can install i2pd over Termux, and then tweak and edit the config files using nano or vim from Termux as well so I assume adding keyrings must be trivial, you technically could even host an eepsite if you use i2pd running on top of Termux. I have no idea if the Java implementation can run over Termux as I never tried but it probably can.
jackal wrote (edited )
Reply to comment by johnbaconator in Google will block sideloading of unverified Android apps starting next year by sovereign
After the massive embarrassment they've made of themselves releasing a desktop machine that has no modular RAM I wouldn't have much hopes on them.
Framework always seemed like a big nothingburger, they get more credit and praise than they deserve, they're not that much into right to repair (as proven with the desktop they released) and they do the bare minimum to not get in the way to make machines serviceable, a barebones laptop design with I/O modules is just the bare minimum user-serviceable-friendly thing to do. Besides these machines use the latests CPUs and tons of spooky mystery proprietary software, I wish they started talking less about mimicking consumer slop tech like smartphones and more about alternative and open hardware such as RISCV.
dev OP wrote
Reply to comment by johnbaconator in Recommended web technologies for I2P and Tor projects by dev
Seems like PHP the way for darknet. As you mention, even I am using JS blockers on my browser while surfing on darknet. I never work with C# ecosystem but I heard about Blazor. Looks fine for darknet as long as not creating any JS on client side.
Thank you for sharing your experience.
dev OP wrote
Reply to comment by cumlord in Recommended web technologies for I2P and Tor projects by dev
Flask also good option on backend but it's been a while I don't use python, and don't feel productive the syntax :) Thank you for sending me scanners tools tho, I will definitely gonna check it out before publishing it.
Seems like PHP + HTML + CSS still solid option for my case. I still wanna figure out how can I find a way to become more productive on PHP. I like the Laravel ecosystem but seems like most of the frontend from JS tech which is not suitable for me. I checked the symfony but seems like they are also continue with some other JS tech on frontend.
Thanks for your comment and good projects
dev OP wrote
Reply to comment by rav in Recommended web technologies for I2P and Tor projects by dev
Looks promising but looks like cloudflare backed, in documentation they showing cloudflare and other cloud providers deployment ways. If I would create something on hidden service or i2p, i probably would host myself, i mean managing on linux server with Nginx. I assume you can do it with pm2 but still not like strong way to manage. In the other hand, I didn't find any template engine like pug on node.js, maybe I couldn't find it. Thanks for writing it tho, learned a new tech on JS ecosystem :)
johnbaconator wrote
Reply to comment by jackal in Google will block sideloading of unverified Android apps starting next year by sovereign
Waiting for Framework to launch that modular smartphone google was "making"
johnbaconator wrote
Reply to by !deleted2204
i am also interested