Recent comments in /f/I2P

Chronic wrote

Indeed, Stormycloud Is by far the most solid outproxy and hopefully it stays that way. If you wanna do like me, you can just add all three outproxies and the router normally resolves itself (separated by a "comma-space").

3

MulliganSecurity wrote

I have set up an outproxy on several machines recently, both stormycloud standard exit and purokishi worked. I did have to wait for a while before everything was stable and I could reliably send trafic through them though

1

privacy_is_dead OP wrote

Reply to comment by cumlord in Problem with outproxy by privacy_is_dead

Hey I have a question: on the right hand side of these forums there is a section "Outproxies" which contains:

  • outproxy.acetone.i2p
  • purokishi.i2p
  • stormycloud.i2p

I noticed that stormycloud.i2p does not work, bui that seems to be because the correct address is exit.stormycloud.i2p

Could it be that purokishi.i2p also has a different actual name?

1

cumlord wrote (edited )

Reply to comment by Chronic in I2P+ 2.9.0+ released by z3d

if you want to do more in i2p than browse and download torrents i'd give it a try :) i2pd is lightweight and feature bare, i2p+ is kind of the opposite

3

cumlord wrote

welcome to i2p

purokishi is a good working outproxy last i checked, though the default outproxy is stormycloud: exit.stormycloud.i2p. outproxy.acetone.i2p is also one to try

3

Chronic wrote

That's awesome. I am currently using I2Pd with I2PSnark-Standalone already, so is I2P+ worth the replacement? Also, the image is really fitting. I would guess that it's generated using Stable Diffusion.

1

z3w OP wrote

Reply to comment by Chronic in I2PSnark torrents "Visible" by z3w

Finally, today the list was cleared. So I guess it has more something to do with the fact that I'm the only seeder or not.

I've uploaded some more torrents and some are now 'Visible' and some not, and non of them had been post as anonymous. So it's still a bit obscure...

1

Chronic wrote

This is only related to others peers knowing about the uploader of the torrent files, not the uploader's IP address. When you upload a Torrent on the Postman Tracker, you can decide whether to upload the torrent as an anonymous uploader or with your Username. In this case your username is visible, and that's alright.

1

Chronic wrote

Honestly I'm unsure, Since most i2p-portable projects I know are way out of date now, including Prestium. I believe that you can run I2Pd-Browser on an external flash drive directly, but idk about running a daemon on portable mode.

If you already figured out a proper solution, a clarified reply would really be appreciated. I'm also wondering how to run I2P on an external storage; whether under a windows or a Linux system.

1

z3d wrote

If you read the column heading again, you'll notice that the visibility relates to ownership of the torrents, not your IP address. In other words, your login name will appear next to the torrents you have uploaded. There is an option to hide your username if that's desirable, but otherwise, nothing is visible to other users.

2

Chronic wrote (edited )

You're Welcome, I haven't heard of this project before, so I can't say if you should use it or not. I usually just use Invidious/Piped instances, and sometimes Freetube as well, however It's still a good thing that there are alternatives. For Tube, If you already compiled it and it works well with you, let me know if it's worth the build.

Curiously, I was wondering if there were any clients written in Rust, and I found this. It uses Tauri and I like the fact this it is way less bloated and more efficient than Electron clients (e.g. Freetube). Though, the RustyTube project is still in its early stages, but still sounds cool to give it a try nonetheless.

2

Chronic wrote

Well, you just answered your own question. Tube.i2p used to be an anonymous YT frontend, but in reality it was so slow and unreliable, so don't even bother.

If you need to, you can simply use an outproxy and connect directly to any YT frontend of your choice that is near you; would be more reliable than an eepsite/hidden-service. It's also a good idea to create a separate profile for your outproxy use-cases, especially for installing extensions like Libredirect, Sponsorblock, etc..

1

cumlord wrote (edited )

it probably could, to me that along with traffic analysis are things that fall more into state sponsored level attack. guess avoiding those chipsets is the way or disabling it, but only 3 people are going to do that. like i'd think that at least with intel it's basically a backdoor, probably would take a fair amount of effort for someone outside of them to exploit it. but i guess that doesn't stop intel from gathering intel, lol

there's a surprising amount of low-lying fruit that can be way easier to do for non state actors. Best to assume your ip address is known to be running i2p as public knowledge, and like just poking around the netdb will give info that can sometimes lead to deanon if not careful

1

blueraspberryesketimine OP wrote (edited )

I wonder how the intel management engine and AMD PSP could be used to track I2P users. They make up the majority of the nodes on this network. We really don't have a way to fight that unless we all jump to RISC-V right? Also, that article is interesting but incredibly outdated. It's from 2010. Id imagine the security posture of i2p has improved dramatically since then.

1