/tech/ - Technology

Technology & Computing

New Reply
Files Max 5 files32MB total
[New Reply]

[Hide] (27.5KB, 640x429)
[Hide] (69.4KB, 686x600)
[Hide] (22.4KB, 640x133)
[Hide] (15.8KB, 305x185)
Discuss alternative Internet protocols and potentially generate a rated list for the sticky.
Censorship is coming, fast. Many users are getting banned on (((mainstream sites))), Cuckflare, hosts and isps are closing in on every wrongthinkers. Find the best alt net to contribute and develop bunkers/comms.
Mesh and alt infrastructures welcome.
Replies: >>4635
>lots of services/sites
>easy to install
>seemingly ok design
<lots of bad records, arrests, shutdowns
<most likely put you on a list
<most bandwidth routed through high-speed (((volunteer))) nodes by default
<may be compromised
Replies: >>806
I have been using I2P for a while, and I think it's pretty good for what it is. Sharing files through bittorrent is great, and I have gotten very good speeds from it surprisingly enough, so that's a huge advantage over Tor which discourages torrenting. Address books are a neat idea and very easy to use, and even if the default lists you are subscribed to aren't that great, there are others which are more complete and up to date.
There is no Freenet-style decentralized distribution of files nor is there yet any functional integration with IPFS, so you are forced to get data from central servers and in case it's down you are out of luck, "try again later :^)".
It doesn't try to integrate with clear net, something that in my opinion is a good thing because as it's demonstrated by Tor, it brings too many problems. Although many of these come from the retarded and non-anonymity-friendly nature of HTML/CSS and JavaScript, so many of those problems are still present in I2P.
That's as far as I can say about I2P. Haven't really tried the others except for Tor, and only sparingly IPFS, Zeronet and Freenet.
Next gen internet does not use current gen internet protocols.
Replies: >>779
Tell me about protocol 7

>active development
>library for dht, decentralized services
<no track record
<no/little services
<fsf is pozzed
<logo is a womb
Replies: >>780
<logo is a womb
Spit out my drink
Semi-related bump from >>>/tech/781. How are other AIPs handling their website directories? I know some use a friend-to-friend system, which is outside the scope of discussion in my opinion. I2P should handle this better, in theory, since everybody is a router node. But I'm not very familiar with details, does anybody know how address resolving works in it? But then the problem shifts to an adversary with Amazon levels of bandwidth simply overwhelming most of the nodes in the overall network.
Tom, the admin of Fatchan and the dev of JSchan has plans to make LokiNet work well with JSchan and bringing up a LokiNet address for Fatchan.
I don't know LokiNet enough and I don't have time to do a full review, but it's something worth looking into.
[Hide] (226.9KB, 862x859)
Some fucking how, Jewsh believes IPFS has existed for several decades.
Replies: >>832
[Hide] (36.3KB, 200x200)
For those who want to use I2P but don't want to install Java, a C++ I2P client.
>most bandwidth routed through high-speed (((volunteer))) nodes by default
Are you talking about the (((guard))) nodes? I actually found that change highly suspect, what better way to ass-rape users than by controlling the centralized, always the same unless you edit it (((guard))) node?
Replies: >>808
Yes. https://www.researchgate.net/publication/336185149_Guard_Placement_Attacks_on_Path_Selection_Algorithms_for_Tor
Replies: >>824

Torpy seems to have a collection of interesting scrips for mitigating guard node crap.

possible language: python, relevance: 14
from torpy import TorClient

hostname = 'ifconfig.me'  # It's possible use onion hostname here as well
with TorClient() as tor:
    # Choose random guard node and create 3-hops circuit
    with tor.create_circuit(3) as circuit:
        # Create tor stream to host
        with circuit.create_stream((hostname, 80)) as stream:
            # Now we can communicate with host
            stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
            recv = stream.recv(1024)
He also seems ignorant on how bitchute uses web torrents as a backup video distribution method. It's already working but hardly anyone uses it as the main site works fine through their CDN servers. It's also not intended to be used by the majority of its users as long as they're still on the clearweb.

In a scenario where they're shut down from the clearweb by losing their hosting, DDoS attack protection from cloudflare or the TLD is revoked they could be up and running again in no time through a web torrent client, the site has been set up this way from day 1. The guy running it has been trying to change the country its jurisdiction is under but it's easier said than done for a company of that type. Being based in the UK is the only real downside of bitchute but they've been following the law and remove content from officially recognized terrorist groups.

The way they've built their service is by far the most efficient way to create an alternative to a major internet service like youtube. Yet for some reason him and his ilk do nothing but attack it.
Replies: >>1818
I'm an fuckshit when it comes to I2P and Lokinet.

I've tried to do I2P but whenever I try to access a site, it tells me error HTTP ERROR: 403
Problem accessing /. Reason:

Console request denied. To allow access using the hostname "http://trac.i2p2.i2p/", add the line "routerconsole.allowedHosts=trac.i2p2.i2p/" to advanced configuration and restart.
ive been fucking with ipfs for a few weeks and still have no idea what it offers over freenet.
There's a new online harms bill coming to the UK and knowing UK law it's likely going to be extremely vague so they can clamp down on the internet with ruthless efficiency. Plenty of people are calling for the UK to restrict access to the internet further after some nurse was raped by a police officer, most of them are the same ones who moan about being arrested for hate speech online. Seems they can't put 2 and 2 together...
Replies: >>1869 >>2312
I don´t know if trusting Lokinet is a wise decision. From what I could understand, Lokinet is a for-profit Tor network.

>mine their crypto (Oxen)
>pay for domain names
>pay to run nodes
>in the future you will pay for "premium services" in Session, for example

About I2P, they say:
"...a network constructed from financial incentives rather than altruism can achieve a greater resilience against attacks, while providing a more reliable service."

Should we trust them? I'm not convinced.
Replies: >>1898 >>3029
How did the police officer rape the nurse using the internet and why is it the internet's fault that he raped her and/or was able to rape her?
>From what I could understand, Lokinet is a for-profit Tor network.
The idea came from I2P having so much code bloat that updating cryptography standard was a mammoth task, if I remember right. So no, it's quite different.
>Should we trust them? I'm not convinced.
I think I2P is mostly funded by meager donations and is primarily a research project, but the Tor Project organization definitely gets more funding and it's extremely hard to track who and where it's coming from. So if you want to compare Tor and Lokinet, it's about the same level of trust - which is, as little as you can afford.
Replies: >>1932
The thing is: anyone can roll a Tor node.
Replies: >>1940
Is that not the same for Lokinet?
Replies: >>1948
Only if you pay some Oxen.
Replies: >>1953 >>2169
>decide to check up on Lokinet
>mentions of combined garlic and onion routing, I2P gone
>backed by some crypto
>3000-14000$ to run a service node
Holy fucking shit, I forgot about it for a year and now I get this.
Replies: >>7047
A nice website listing the different alt nets, a little rough looking though.
I think lokinet should get a mention as well
Replies: >>2047

Check out mazerunner, it's a hybrid take on garlic and onion routing, and uses a regenerative model for building relays. Worth a shot.

pastebin (dot) com / kGAbqzc9
Replies: >>2078

I second this, they have an official repo up atm 


This is still very very experimental though.. :-/
>oyyy vey you can't just run a node for free
>remember the six million sybil attacks
>you have to buy this coin that's mostly in the hands of the devs
>it's not a pyramid scheme stupid goy
>even though 5% of every block reward goes straight to their "foundation"
If they weren't running a con they would have used ETH or any DeFi shitcoin, not rolled their own. Is there anything like i2p, but a clean redesign? I'm looking for a similar garlic routed network with UDP support that doesn't get updated at the speed of molasses.
Replies: >>2228
[Hide] (49.4KB, 440x515)
oy vey how dare you GOY. Ban this vicious anti semite at once fa ruining our ponzi.
How the hell does this law make sense
Replies: >>2313
Because it's the UK.
Realistically nobody would use this crap. Just more ways to look like a clown.
is dead
Replies: >>3874 >>4561
Zeronet can also leak your IP address
Replies: >>4561
>a software akin to limewire where it's independent of some random server
Two different ballparks but the sentiment still is the same. The feds are attacking any place that is truly independent. 
<cp might be on ur computer due to it being p2p AND they leaked your IP!
<better not click anything goy!

Maybe disable images and video I guess. No file sharing, just text. Problem solved. No moar cheese pizzas on your hard drive that you could have encrypted anyway.
>>769 (OP) 
Personal experience. Add ons and 3rd party extensions are needed to make Freenet  a bit more secure. By default, Freenet is trackable by State level authorities and constantly monitored. 

This might help you more tech savvy fuckers. I'm just a random dork.
Just heard of this Locutus thing by the creator of Freenet, Ian Clarke. Any thoughts?

Replies: >>6829 >>6831
>rust faggotry
>web assembly
Holy shit. I have never seen anything gayer than this for a while.
That aside, I don't see anonymity in their model. A counter censorship overlay network ideally should ideally provide:
The network/protocol does not provide information that can lead to identification of sender and receiver  by the sender, receiver and anyone else.
>security & data integrity
The network/protocol ensures only the receiver (maybe not even the sender) can access the information from the sender. The data is possible to be tempered at the same time.
>plausible deniability
Anyone on the network should be able to plausibly deny transmitting any specific data or even the fact of using the network.
Applications written for the network should be providing:
>possibility of independent authentication
When the user wants to use a tripcode/public key, he should be able to and with confidence that practically noone else can use that identifier.
Programs should be written in a way such that data is not centralized to one place. Data integrity and authentication can be used to ensure identity of the re-transmitted message.
Replies: >>6830 >>6832
data is *not possible to be tempered at the same time
>Just heard of this Locutus thing by the creator of Freenet, Ian Clarke. Any thoughts?
Freenet's design was so fundamentally broken they had to stop referring to it as "anonymous" on their website after everyone got v&ed. That's my first thought.
> I don't see anonymity in their model
Me neither. It's probably the same trick as freenet: the only way to use the network securely is to only connect to nodes you already know and trust not to attack you ("""darknet mode""").
[Hide] (482.6KB, 590x1024)
Replies: >>7046
[Hide] (27.3KB, 512x512)
> What are some good torrc configurations / flags  that improve things?

Obviously the default is good but sometimes depending on what your doing you may need to change it like for example you want to make sure your "Destination IP" stays that of a certain country {ua} or countries. 

> Specificly I think using ExitNodes {all},{the},{countries},{you},{want},{with the ones you dont want like 14-9-5 eyes} StrictNodes 1 is better then using ExcludeNodes {of the countries you don't want}


Exclude 14-Eyes + other non desirable Exit Nodes

ExitNodes {af},{al},{dz},{ad},{ao},{ag},{ar},{am},{at},{az},{bs},{bh},{bd},{bb},{by},{bz},{bj},{bt}{bo}{ba},{bw},{br},{bn},{bg},{bf},{bi},{cv},{kh},{cm},{cf},{td},{cl},{co},{km},{cg},{cr},{hr},{cu},{cy},{cz},{dj},{dm},{do},{ec},{eg},{sv},{gq},{er},{ee},{sz},{et},{fj},{fi},{ga},{gm},{ge},{gh},{gr},{gd},{gt},{gn},{gw},{gy},{ht},{hn},{hu},{is},{in},{id},{ir},{iq},{ie},{jm},{jo},{kz},{ke},{ki},{kw},{kg},{la},{lv},{lb},{ls},{lr},{ly},{li},{lt},{lu},{mg},{mw},{my},{mv},{ml},{mt},{mh},{mr},{mu},{mx},{md},{mc},{mn},{me},{ma},{mz},{na},{nr},{np},{ni},{ne},{ng},{mk},{om},{pk},{pw},{pa},{pg},{py},{pe},{ph},{pl},{pt},{qa},{ro},{rw},{kn},{lc},{vc},{ws},{sm},{st},{sn},{rs},{sc},{sl},{sg},{sk},{si},{sb},{so},{za},{kr},{sd},{lk},{sd},{sr},{ch},{sy},{tj},{tz},{th},{tl},{tg},{to},{tt},{tn},{tr},{tm},{tv},{ug},{ua},{uy},{uz},{vu},{ve},{vn},{ye},{zm},{zw} StrictNodes 1

But if your not using bridges then using ExcludeNodes for  middle nodes is ok then

like ExcludeNodes {de},{??} or something etc

However the only thing is sometimes when using Onions the exits set gets ignored and uses nodes specifly excluded?

> Besides specifing Nodes what other flags are useful or can help you?

> Breifly remember (too lazy to look up) their was a way to reject relays that were on Windoze computers or older versions of Tor? 

> Furthermore is there a way to restrict/block relays that not configured correctly (maybe on purpose) that are using Google DNS or Cloudflares ?

> Or block relays that are on AWS ((( amazon ))) or Azure ((( Micro$oft ))) ???

Post Good Torrc Examples or Information!

Post Good Torrc config Examples or Information!

Baofengs are great but not trying to get bleached

Problem with lokinet is if you don't set the exitnode manually or in the Loki Config file (idk what its called its equivilent to Tor's torrc) you will be using your real IP so.

Also they hardly have any public Exitnodes listed

Lokinet is unpolsished and no finished but remember it uses UDP not TCP like Tor ....It basically like a Decentralized Cyrpto Multihop VPN in which you can set up to 12 hops I believe....setting 4-6 is better imo
Governments bend and break their own laws. Why would any government give a fuck about  laws of countries that won't play ball with them? Nothing's stopping them from hosting nodes in "good" countries.  Is blocking nodes a meme? It creates a smaller pool of nodes, so glow niggers would need less to have majority control.
Replies: >>7067
Thats absolutely true but if one needs to not have a "Desitnation IP" from their Country they may need it or a website may be gay and block certain IPs from veiwing certain content. 
> To use Shiddit you need to maintain the same country IP each Time when creating a new account or you will get shadowbanned by the API.
> One needs to be safe when looking at r/CovidVaccinated and posting on r/twinks
Have you ever got this content is blocked in your country before?
Specificly like Germany and labeling stuff holocaust denial.
> German Nodes {de} make up 30% of whole Tor Network or somting like dat
> just curious of what torrc configs/flags might be good that are not default or may be overlooked by Tor devs too busy dying their hair pink and attending BLM protests.
>ExitNodes {ua} StrictNodes 1
nah doode FSB all the way 
EntryNodes {ru} StrictNodes 1
ExcludeNodes {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es},{jp},{cn},{tw},{kp},{sg},{il},{sa},{ae}{??}
ExitNodes {ru} StrictNodes 1
NodeFamily {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es},{jp}
Maybe EnforceDistinctSubnets 1 nigger?
EntryNodes {is},{ua},{ro},{bg},{ba},{hk},{my},{iv},{ee},{cz},{bz},{it},{md},{ph},{rs},{th},{ve},{ma},{do},{cr},{by},{ar} StrictNodes 1
ExcludeNodes {ru},{cn},{il},{sg}{sa},{ae},{tw},{kp}
ExitNodes {af},{al},{dz},{de},{dk},{ad},{ao},{ag},{ar},{am},{at},{az},{bs},{bh},{bd},{bb},{by},{se},{es},{bz},{bj},{bt}{bo}{ba},{bw},{br},{bn},{bg},{bf},{bi},{cv},{kh},{cm},{cf},{td},{cl},{co},{be},{it},{km},{cg},{cr},{hr},{cu},{cy},{cz},{dj},{dm},{do},{ec},{eg},{sv},{gq},{er},{ee},{sz},{et},{fj},{fi},{fr},{ga},{gm},{ge},{gh},{gr},{gd},{gt},{gn},{gw},{gy},{ht},{hn},{hu},{is},{in},{id},{ir},{iq},{ie},{jm},{jo},{kz},{ke},{ki},{kw},{kg},{la},{lv},{lb},{ls},{lr},{ly},{li},{lt},{lu},{no},{mg},{mw},{my},{mv},{ml},{mt},{mh},{mr},{mu},{mx},{md},{mc},{mn},{me},{ma},{mz},{na},{nr},{np},{ni},{ne},{nl},{ng},{mk},{om},{pk},{pw},{pa},{pg},{py},{pe},{ph},{pl},{pt},{qa},{ro},{rw},{kn},{lc},{vc},{ws},{sm},{st},{sn},{rs},{sc},{sl},{sg},{sk},{si},{sb},{so},{za},{kr},{sd},{lk},{sd},{sr},{ch},{sy},{tj},{tz},{th},{tl},{tg},{to},{tt},{tn},{tr},{tm},{tv},{ug},{ua},{uy},{uz},{vu},{ve},{vn},{ye},{zm},{zw} StrictNodes 1
[Hide] (4.5MB, 480x360, 00:51)
>wh*te people
Replies: >>7105
I heard or read in manpages that ExcludeExitNodes {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es} is not as good as using ExitNodes {shithole countries here} StictNodes 1
Its not good to have set specific "EntryNodes" as if you ever need to use bridges u will be damned!...But setting ExitNodes {specific NATO countries} is good for certain use cases.
Like you may not want the website to have certain Country IPs as "the Destination IP" or need to have same Country IPs so your account doesn't get locked lets say for things like gaybay or scamazon.
Or for >>7045 reddit spacing poster they may need to have same IP so they don't get shadowbanned by the API bot detection while looking at and posting on r/twinks
Replies: >>7107
>ExitNodes {shithole countries here} StictNodes 1
This ^ haha
"Darknets" can't be all about the technology. You need to build your own informal network of people, based around a shared interest that requires discretion. Think of it as a manually maintained darknet inside of the darknet. This is how various "rings" operate, for better or worse. But you need to learn from them.

Building a network of people takes time and skill and maintenance. Base your network around an activity of shared interest which also has potential for a lot of spin-offs. It has to be something that involves money changing hands so that it eventually begins to attract people on its own momentum.

I suggest gambling. Build a gambling network, but start with something small and silly. Place bets using small amounts of shit crypto that anyone can get just by watching ads. Bet on stupid bullshit like sports & celebrity, but also more serious things like politics and war. As the network grows more serious and more money changes hands you can branch out into other kinds of money-making schemes and add more variety to your network.

I've read through some academic & law enforcement papers on how p3d0 rings operate on the darknet. They fit the meta criteria of the kind of network I'm talking about. I even made a list of the common features that bind them together (aside from the obvious one) and how one builds trust between anonymous individuals.

I'll post it if anyone gives a shit. But I just needed to get that off my chest. It's the Achilles Heel of every discussion I see on what is the best darknet or how to build a better one. Think about the specific human activities that the darknet is used for (shit-posting doesn't count) and leverage it.
Replies: >>7550
Post it. How do you mitigate against infiltration? Any secret club suffers from the same problem, that friend's friend may not be your friend.
Replies: >>7568 >>7588 >>7901
>How do you mitigate against infiltration?

You need to be realistic about the actual threat level. Feds are combing through the darknet to find pedos, terrorists, drug dealers and arms dealers. If you're not in those categories you're already fairly safe unless you're literally TRYING to be an idiot. Just don't talk about your personal life. Alternatively you could invent a fictional personal life and talk about that one. If you're too lazy for that you could borrow the details of some other assholes personal life, preferably someone you hate, and talk about it like it's your personal life. Drop enough clues for the feds to find him and you can kill two birds with one stone.

The thing about infiltration by law enforcement into any sort of illegal network is they're only going after a small number of people. Their goal is to shut down the network. If it's a CP community they want to catch the small minority of users who upload most of the material. If it's an illegal market they want to bust the vendors who do most of the selling. If you're just a small fry on a network that is itself a small fry compared to other kinds of networks, you don't have a lot to worry about.

Here's what I've gleaned from academic papers about CP communities on how they build trust within their anonymous networks. I've chosen to focus on them because these are people who know for 110% certainty that they are being watched by the feds and also talking to feds. The communities that flourished were characterized by:

Good sense of humor
Socially active users
Many connections
Provide validation, understanding, normalization & camradery for marginalized opinions & interests
Provide ways to gain status within the network
Provide knowledge and expertise to new members
Provide fresh new content
Share personal interests outside of the purpose of the network (catching up)
Adopt language to differentiate between ourselves and the outside world
Appeal to collecting behavior
Use content to facilitate social relationships
Trade privately
Growth should be moderate and sustained, not happen in staggered bursts
Members should be monitored for their behavior, levels of engagement, trust-worthiness
Motivations behind darknet "criminal" networks include
    Freedom of information
    Defiance of authority
    Sexual gratification
    Technological prowess
Nurture positive roles and openness
Letting people in for money doesn't foster trust
Trustworthiness grounded in humor and sarcasm
Shared vision, perceived responsiveness and knowledge growth
Elaborate trust-building requirements
Need both interpersonal trust and institutional trust (reputation system)
Replies: >>7588

I think intelligence agencies target 8chan-affiliated imageboards because they know a significant proportion of the userbase are: 
>autistic or mentally ill
>between the ages of 16 and 30
>have trouble finding romantic partners
They understand how and what to manipulate this psychological profile into. For example, they want to groom the next mass murderer so the media runs a story about gun violence. Therefore, gun control legislation forced on the table. 
They don't target female-dominated imageboards in the same ways nearly as much because it is rare (compared to male incidence rates) for women commit violent crimes. And it is especially the case that autistic individuals develop fixations and obsessions that normal people do not.
Even though a userbase is anonymous, it doesn't mean more general attributes of it can be defined. They can, for example, measure a userbase is male by sexual interests (posting pornography), young adults (entertainment media), white, and so forth. 
Historically, posting porn, depressive relationshit, nazi larping has identified and defined what would ordinarily be a nebuluous and undefined userbase. (They can't manipulate what isn't be defined as easily.)
Replies: >>7680
>between the ages of 16 and 30
>How do you mitigate against infiltration?
The grugq did a good writup of a usenet pedogroup.

<* Demonstrate active participation in the “trading scene”
<* Invited by existing member
<* Must exhibit deep domain specific knowledge via timed written test

<The members who were caught were those who violated the security SOP of the group:
<* Accessing a newsgroup server without using Tor (e.g. VPN, or directly)
<* Revealing personal details about themselves
<* Contacting each other outside the group’s secure comms channel

Replies: >>7912
The link is a wonderland, thanks.
Replies: >>7940
He's always been good but the last writing there is from 2013. Who is the new shit?
A few new IPFS apps have appeared on f-droid
[Hide] (647KB, 852x1280)
[Hide] (57.2KB, 580x700)
Repost of >>>/meta/4433
First pic related is outdated by a few years. You should use the HTTP proxy instead of the SOCKS proxy since the HTTP proxy masks your browser user agent to be MYOB/6.66 (AN/ON) while the SOCKS proxy doesn't mask your browser user agent.

Here is a short tutorial on how to create an i2pd HTTP tunnel: https://i2pd.readthedocs.io/en/latest/tutorials/http/

You don't need to open the httpd port for I2P traffic on your firewall. There isn't any nginx example for this, but I have a simple static site example for OpenBSD httpd:

language: json
server "zmjdpytveh2mp6krdnlniupxnv2cgacmffhznbxvgypl63tjchfa.b32.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log

server "example.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log

You can primarily provide a B32 address link. An address helper link in addition is optional and you don't need a registry service since the short domains are added to the user's local addressbook when an address helper link is clicked.
The i2pd webconsole listens on port 7070 by default. If you need to access the i2pd webconsole on your local machine web browser, use a SSH tunnel:

language: bash
ssh -NL 7073:localhost:7070 [insert server IP]

These instructions below assume you are using a SSH tunnel for the webconsole.

To generate an addresshelper, visit this page of the i2pd webconsole and click on your server tunnel hotlink. Copy the Base64 hash and paste it into the below link to create an address helper:
http://example.i2p/?i2paddresshelper=[Insert Base64 hash here]

The only decent I2P domain registry I know of is http://reg.i2p/ http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/
Their TOS states that domains with "offensive content" will be hidden from the lists, but are still searchable and can be unhidden. I don't know what is deemed "offensive content" by reg.i2p. All the other I2P domain registries will remove your domain from the database completely if they deem your content to be offensive.

To register your domain on reg.i2p, open a web browser that uses the i2pd HTTP proxy and go to the i2pd webconsole and click on your server tunnel. Click on "Address registration line" and type any name you want, then click "generate". Click on "submit" to submit to reg.i2p.
Replies: >>8175 >>8176 >>8275
Haven't been into ip2 for quite awhile. Last time I lurked all the chans over there, it was literally ghost town. Also koh_l is a fucking low quality garbage board. I couldn't even bare lurking in there.
[Hide] (211.1KB, 1080x1222)
Repost of >>>/meta/4439
Turns out you can leave out the "example.i2p" block from your webserver config since those kinds of addresses are simply base64 aliases to the B32 address.

The OpenBSD config would look like this now:
language: json
server "zmjdpytveh2mp6krdnlniupxnv2cgacmffhznbxvgypl63tjchfa.b32.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log
>since the HTTP proxy masks your browser user agent to be MYOB/6.66 (AN/ON) while the SOCKS proxy doesn't mask your browser user agent.
ohhhhh so that's why bt.t-ru.org trackers were giving me 403 forbidden when i tried using i2p outproxy to proxy peer lists. is there any way to get user agent that can be used with i2p like torsocks can? so i can use i2p proxy like normal proxy without user agent being weird?
Replies: >>8278
[Hide] (288.4KB, 1280x720)
Use the SOCKS5 proxy, port 4447
[New Reply]
69 replies | 16 files
Show Post Actions



Select the solid/filled icons
- news - rules - faq -
jschan 0.10.2