not_bob

not_bob wrote

I was one of the ones to contact you directly via #saltr. My main focus is on growing the i2p network. I run an i2p site tracker that provides nearly real time status of any i2p website. http://notbob.i2p

This puts me in a similar situation as you. Being forced to say "Yeah, no" from time to time. IE, ground rules.

What I've done is to outright ban anything that involves the exploitation of real children. Then, I put a warning on things that I would think the community as a whole would find offensive. But, that's all it is. A warning. I still provide the keys to get to those sites. It's more of a "Do you really want this?" And, if the person does. Whatever. Not my worry.

And this is where the problem lies, and why I contacted Rambler. I'm an active user on ramble. I enjoy some of the content here. But, there is some that I'd simply rather not see. I don't care if it's here. I just don't want to have to look at it. Neither do new i2p users who are looking for cool stuff to find on the network.

One day I loaded ramble.i2p and my session had expired. I saw things that made me tempted to put the warning tag on ramble.i2p. I didn't Instead I contacted Ramble directly.

Apparently I was not the only one.

I had suggested a more curated approach to what appears on the front page. Note, I am not saying limit free speech. I'm just saying limit what the entry experience is. The first page really matters to new users.

There was discussion in this post about a NSFW tag. I think that would work nicely. With the only real effect of the tag is it preventing said items from appearing on the front page.

Wahaha suggested a few posts from each forum at random. I like that idea. This prevents any one group from taking up the entire front page.

In the end, a mix of the two would likely be the best solution.

It's a hard call. It really is.

2

not_bob OP wrote (edited )

Reply to comment by Wahaha in Best loli anime? by not_bob

there are a few on that list i haven't seen!

I would also include the following.

Astarotte no Omocha! - Much fanservice.

Moetan - Pure fanservice! It does not get much better than this.

Hentai Ouji to Warawanai Neko - Much flatness, good fun.

Eromanga-sensei - This anime will go down in history.

Girls Last tour - Super cute and sad.

Made in Abyss - Loli bondage murder hole!

No Game No Life - A pantyshot to introduce a main character?! Yes!

Kiss x Sis (one very notable loli) - As close to porn as it gets without being porn.

Koe de Oshigoto! - Super cute, not as flat.

Military! - Just silly.

Mitsudomoe - Little fanservice. Much perversion.

Ryofuko-chan - WTF with loli fanservice.

Shomin Sample - Much fanservice. Some loli.

Ryuuou no Oshigoto! - Almost every loli joke in the book with fanservice.

Usagi drop - I'm going to hell anyway.

1

not_bob wrote (edited )

I also suggest the following.

http://identiguy.i2p/cgi-bin/submit

http://isitup.i2p/register.html

Once your site has been integrated into the network it will show up on http://notbob.i2p if you click on the "new" tab.

Eventually I will be offering registration services as well.

3

not_bob OP wrote

Reply to comment by abralelie in What do you i2p for? by not_bob

Killer app? Hard to say. There are many fun things to do here. In my limited spare time I write software that tests eepsites to check what can be found. I wrote it a while back as it was difficult to find working sites. Frustrated with this, a solution! http://notbob.i2p

It's not a killer site by any means. But, it lets you find content on the i2p network with ease. It only lists sites that work.

1

not_bob OP wrote (edited )

Reply to comment by abralelie in What do you i2p for? by not_bob

http://purokishi.i2p/

This is the outproxy you want. Disable false.i2p in your config.

Create a new tunnel in http://127.0.0.1:7657/i2ptunnelmgr

Set it to start on load. Set the port to 4444.

Set your outproxies to "purokishi.i2p".

As for the encryption type? You can leave it at "Both", but this outproxy only uses ECIES. Either will work.

Save the config. Make sure to disable the default outproxy, false.i2p and then start the new one. You will have a much faster time browsing the clearnet via i2p.

1

not_bob wrote

Let me go into more detail. Don't use the same browser for clearnet and tor. Never do this.

It's best to clear the data from whatever browser you use for tor every time you start it. The tor browser does this on it's own. It would be easy enough to correlate you via left-over browser data.

You should really be using the tor browser unless you have a specific need to not.

Don't use javascript unless you really need it. That can expose you. Not only that, but who wants to run untrusted code? This will break some sites.

Don't mix your lives. Your bank account should never be accessed over tor. Nor your facebook, twitter or whatever else. Unless that's the only way you ever access it. Think political bloggers in some less than free countries. It depends on your case use. But, never login with the same account on both networks.

4