Recent comments in /f/I2P
j8810kkw wrote
Reply to Problem with outproxy by privacy_is_dead
I am actually curious at how these would even be self-hosted(you know for personal experience on my part)
privacy_is_dead OP wrote
Reply to Problem with outproxy by privacy_is_dead
This reddit thread helped me add purokishi to my address book:
http://shreddit.i2p/r/i2p/comments/hcezcq/new_i2p_outproxy_service_purokishii2p/
Now it seems that purokishi.i2p works as well!
privacy_is_dead OP wrote
Reply to comment by cumlord in Problem with outproxy by privacy_is_dead
Hey I have a question: on the right hand side of these forums there is a section "Outproxies" which contains:
- outproxy.acetone.i2p
- purokishi.i2p
- stormycloud.i2p
I noticed that stormycloud.i2p does not work, bui that seems to be because the correct address is exit.stormycloud.i2p
Could it be that purokishi.i2p also has a different actual name?
privacy_is_dead OP wrote
Reply to comment by cumlord in Problem with outproxy by privacy_is_dead
So, I managed to get outproxy.acetone.i2p working but it is extremely slow. I am trying exit.stormycloud.i2p now which seems to be faster. Thank you!
cumlord wrote (edited )
Reply to comment by Chronic in I2P+ 2.9.0+ released by z3d
if you want to do more in i2p than browse and download torrents i'd give it a try :) i2pd is lightweight and feature bare, i2p+ is kind of the opposite
cumlord wrote
Reply to Problem with outproxy by privacy_is_dead
welcome to i2p
purokishi is a good working outproxy last i checked, though the default outproxy is stormycloud: exit.stormycloud.i2p. outproxy.acetone.i2p is also one to try
Chronic wrote
Reply to I2P+ 2.9.0+ released by z3d
That's awesome. I am currently using I2Pd with I2PSnark-Standalone already, so is I2P+ worth the replacement? Also, the image is really fitting. I would guess that it's generated using Stable Diffusion.
privacy_is_dead wrote
Reply to The easiest way to get the most out of I2P: Update your subscription lists and change your outproxy. by Rambler
I am trying to follow these instructions and (1) has worked: I have the new list of subscriptions and I can see my address book populating with lots of new sites.
I have a problem with step (2): it seems that purokishi.i2p is not reachable for some reason. I this outproxy outdated? What can I use instead?
z3w OP wrote
Reply to comment by Chronic in I2PSnark torrents "Visible" by z3w
Finally, today the list was cleared. So I guess it has more something to do with the fact that I'm the only seeder or not.
I've uploaded some more torrents and some are now 'Visible' and some not, and non of them had been post as anonymous. So it's still a bit obscure...
z3w OP wrote
Reply to comment by Chronic in I2PSnark torrents "Visible" by z3w
I understand but I have at least one other torrent where the owner name is note hidden and it does not appear on that list. So my question...
Chronic wrote
Reply to I2PSnark torrents "Visible" by z3w
This is only related to others peers knowing about the uploader of the torrent files, not the uploader's IP address. When you upload a Torrent on the Postman Tracker, you can decide whether to upload the torrent as an anonymous uploader or with your Username. In this case your username is visible, and that's alright.
Chronic wrote
Honestly I'm unsure, Since most i2p-portable projects I know are way out of date now, including Prestium. I believe that you can run I2Pd-Browser on an external flash drive directly, but idk about running a daemon on portable mode.
If you already figured out a proper solution, a clarified reply would really be appreciated. I'm also wondering how to run I2P on an external storage; whether under a windows or a Linux system.
z3d wrote
Reply to I2PSnark torrents "Visible" by z3w
If you read the column heading again, you'll notice that the visibility relates to ownership of the torrents, not your IP address. In other words, your login name will appear next to the torrents you have uploaded. There is an option to hide your username if that's desirable, but otherwise, nothing is visible to other users.
Chronic wrote (edited )
Reply to comment by j8810kkw in A curious thing about tube.i2p by j8810kkw
You're Welcome, I haven't heard of this project before, so I can't say if you should use it or not. I usually just use Invidious/Piped instances, and sometimes Freetube as well, however It's still a good thing that there are alternatives. For Tube, If you already compiled it and it works well with you, let me know if it's worth the build.
Curiously, I was wondering if there were any clients written in Rust, and I found this. It uses Tauri and I like the fact this it is way less bloated and more efficient than Electron clients (e.g. Freetube). Though, the RustyTube project is still in its early stages, but still sounds cool to give it a try nonetheless.
j8810kkw OP wrote
Reply to comment by Chronic in A curious thing about tube.i2p by j8810kkw
Thanks Chronic. Think I can use https://git.mills.io/prologic/tube from here since it seems a bit more useful and stuff? I'm sure it could be worth a try hosting a separate video host or something.
Chronic wrote
Reply to comment by bolvan in A curious thing about tube.i2p by j8810kkw
- Nope, the site doesn't work with either because it is already down.
- I2pd rocks, and so as the other clients, as long it works well with whomever uses them.
Chronic wrote
Reply to A curious thing about tube.i2p by j8810kkw
Well, you just answered your own question. Tube.i2p used to be an anonymous YT frontend, but in reality it was so slow and unreliable, so don't even bother.
If you need to, you can simply use an outproxy and connect directly to any YT frontend of your choice that is near you; would be more reliable than an eepsite/hidden-service. It's also a good idea to create a separate profile for your outproxy use-cases, especially for installing extensions like Libredirect, Sponsorblock, etc..
not_bob wrote
Reply to comment by bolvan in A curious thing about tube.i2p by j8810kkw
i2pd offers a http proxy server, it works well.
i2pd is great, if you are ok with flat config files and no limits.
bolvan wrote
Reply to A curious thing about tube.i2p by j8810kkw
- Site don't working with socks proxy. Must be http.
- I2pd sucks.
cumlord wrote (edited )
Reply to comment by blueraspberryesketimine in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
it probably could, to me that along with traffic analysis are things that fall more into state sponsored level attack. guess avoiding those chipsets is the way or disabling it, but only 3 people are going to do that. like i'd think that at least with intel it's basically a backdoor, probably would take a fair amount of effort for someone outside of them to exploit it. but i guess that doesn't stop intel from gathering intel, lol
there's a surprising amount of low-lying fruit that can be way easier to do for non state actors. Best to assume your ip address is known to be running i2p as public knowledge, and like just poking around the netdb will give info that can sometimes lead to deanon if not careful
blueraspberryesketimine OP wrote (edited )
Reply to comment by cumlord in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
I wonder how the intel management engine and AMD PSP could be used to track I2P users. They make up the majority of the nodes on this network. We really don't have a way to fight that unless we all jump to RISC-V right? Also, that article is interesting but incredibly outdated. It's from 2010. Id imagine the security posture of i2p has improved dramatically since then.
cumlord wrote
Reply to comment by blueraspberryesketimine in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
you should be able to set the port like z3d said and it'll only use that, dangerous to share obviously because port scanning could be done to identify from suspected ips
i think in theory this is probably true to an extent, we're getting into the realm of traffic analysis. There's some info on this on http://i2p-projekt.i2p/en/docs/how/threat-model
righttoprivacy wrote (edited )
Reply to comment by blueraspberryesketimine in I2P+ leaking onto clearnet somehow? by blueraspberryesketimine
As not_bob mentioned, it's useful.
I2P+ comes with feature rich console interface, one that also happens to be a great place for beginners to start out - doesn't mean users would need to keep the outproxy.
Some otherwise might not have opportunity to try outproxy (some lazy, some unsure how).
And having access to browse clearnet also means a user is more likely to keep an i2p browser (in turn, i2prouter) set up - this means more traffic for all of us. And that's good for all.
In this way, I'd say it's a win win, to have built in (by default, not required to keep).
blueraspberryesketimine OP wrote (edited )
Reply to comment by z3d in De-anon risk on I2P with consumer firewall products? by blueraspberryesketimine
incorrect. The port the relay uses to the outside world is random and not to be disclosed, and certainly never a fixed port posted on a ramble post. Also, this fails to address my question. products like the firewalla purple can phone home and keep track of all the connections made on the port I granted a firewall exception to. My question was whats stopping the companies behind these products (or even just he ISPs themselves) from linking all the connections people are making on I2P? They wouldn't know the content of the data being sent but they would be able to piece together the paths it took potentially leading to deanon.
j8810kkw wrote
Reply to I2P+ 2.9.0+ released by z3d
Well looks like I'm enjoying this bit so far