/tech/ - Technology

Technology & Computing


New Reply
Name
×
Sage
Subject
Message
Files Max 5 files32MB total
Tegaki
Password
[New Reply]


freenet.png
[Hide] (27.5KB, 640x429)
gnunet.png
[Hide] (69.4KB, 686x600)
i2p.png
[Hide] (22.4KB, 640x133)
tor.png
[Hide] (15.8KB, 305x185)
Discuss alternative Internet protocols and potentially generate a rated list for the sticky.
Censorship is coming, fast. Many users are getting banned on (((mainstream sites))), Cuckflare, hosts and isps are closing in on every wrongthinkers. Find the best alt net to contribute and develop bunkers/comms.
Mesh and alt infrastructures welcome.
Compare:
>Tor
>I2P
>Freenet
>GNUnet
>Zeronet
>IPFS
>Yggdrasil
Tor
>lots of services/sites
>easy to install
>seemingly ok design
<lots of bad records, arrests, shutdowns
<most likely put you on a list
<most bandwidth routed through high-speed (((volunteer))) nodes by default
<may be compromised
Replies: >>806
I have been using I2P for a while, and I think it's pretty good for what it is. Sharing files through bittorrent is great, and I have gotten very good speeds from it surprisingly enough, so that's a huge advantage over Tor which discourages torrenting. Address books are a neat idea and very easy to use, and even if the default lists you are subscribed to aren't that great, there are others which are more complete and up to date.
There is no Freenet-style decentralized distribution of files nor is there yet any functional integration with IPFS, so you are forced to get data from central servers and in case it's down you are out of luck, "try again later :^)".
It doesn't try to integrate with clear net, something that in my opinion is a good thing because as it's demonstrated by Tor, it brings too many problems. Although many of these come from the retarded and non-anonymity-friendly nature of HTML/CSS and JavaScript, so many of those problems are still present in I2P.
That's as far as I can say about I2P. Haven't really tried the others except for Tor, and only sparingly IPFS, Zeronet and Freenet.
Next gen internet does not use current gen internet protocols.
Replies: >>779
>>778
Tell me about protocol 7

GNUnet
>freedom
>active development
>library for dht, decentralized services
<alpha
<no track record
<no/little services
<fsf is pozzed
<logo is a womb
Replies: >>780
>>779
<logo is a womb
Spit out my drink
Semi-related bump from >>>/tech/781. How are other AIPs handling their website directories? I know some use a friend-to-friend system, which is outside the scope of discussion in my opinion. I2P should handle this better, in theory, since everybody is a router node. But I'm not very familiar with details, does anybody know how address resolving works in it? But then the problem shifts to an adversary with Amazon levels of bandwidth simply overwhelming most of the nodes in the overall network.
Tom, the admin of Fatchan and the dev of JSchan has plans to make LokiNet work well with JSchan and bringing up a LokiNet address for Fatchan.
https://fatchan.org/tech/thread/13.html
http://cimixezweeq64g42vl6tyhk4becxhi4ldwqq6w43u53qhwsd3s4c3lyd.onion/tech/thread/13.html
I don't know LokiNet enough and I don't have time to do a full review, but it's something worth looking into.
ClipboardImage.png
[Hide] (226.9KB, 862x859)
Some fucking how, Jewsh believes IPFS has existed for several decades.
Replies: >>832
i2pd.png
[Hide] (36.3KB, 200x200)
For those who want to use I2P but don't want to install Java, a C++ I2P client.
https://i2pd.website/
>>776
>most bandwidth routed through high-speed (((volunteer))) nodes by default
Are you talking about the (((guard))) nodes? I actually found that change highly suspect, what better way to ass-rape users than by controlling the centralized, always the same unless you edit it (((guard))) node?
Replies: >>808
>>806
Yes. https://www.researchgate.net/publication/336185149_Guard_Placement_Attacks_on_Path_Selection_Algorithms_for_Tor
Replies: >>824
>>808
https://pypi.org/project/torpy/

Torpy seems to have a collection of interesting scrips for mitigating guard node crap.

possible language: python, relevance: 14
from torpy import TorClient

hostname = 'ifconfig.me'  # It's possible use onion hostname here as well
with TorClient() as tor:
    # Choose random guard node and create 3-hops circuit
    with tor.create_circuit(3) as circuit:
        # Create tor stream to host
        with circuit.create_stream((hostname, 80)) as stream:
            # Now we can communicate with host
            stream.send(b'GET / HTTP/1.0\r\nHost: %s\r\n\r\n' % hostname.encode())
            recv = stream.recv(1024)
>>802
He also seems ignorant on how bitchute uses web torrents as a backup video distribution method. It's already working but hardly anyone uses it as the main site works fine through their CDN servers. It's also not intended to be used by the majority of its users as long as they're still on the clearweb.

In a scenario where they're shut down from the clearweb by losing their hosting, DDoS attack protection from cloudflare or the TLD is revoked they could be up and running again in no time through a web torrent client, the site has been set up this way from day 1. The guy running it has been trying to change the country its jurisdiction is under but it's easier said than done for a company of that type. Being based in the UK is the only real downside of bitchute but they've been following the law and remove content from officially recognized terrorist groups.

The way they've built their service is by far the most efficient way to create an alternative to a major internet service like youtube. Yet for some reason him and his ilk do nothing but attack it.
Replies: >>1818
I'm an fuckshit when it comes to I2P and Lokinet.

I've tried to do I2P but whenever I try to access a site, it tells me error HTTP ERROR: 403
Problem accessing /. Reason:

Console request denied. To allow access using the hostname "http://trac.i2p2.i2p/", add the line "routerconsole.allowedHosts=trac.i2p2.i2p/" to advanced configuration and restart.
ive been fucking with ipfs for a few weeks and still have no idea what it offers over freenet.
Replies: >>11112
>>832
There's a new online harms bill coming to the UK and knowing UK law it's likely going to be extremely vague so they can clamp down on the internet with ruthless efficiency. Plenty of people are calling for the UK to restrict access to the internet further after some nurse was raped by a police officer, most of them are the same ones who moan about being arrested for hate speech online. Seems they can't put 2 and 2 together...
Replies: >>1869 >>2312
I don´t know if trusting Lokinet is a wise decision. From what I could understand, Lokinet is a for-profit Tor network.

>mine their crypto (Oxen)
>pay for domain names
>pay to run nodes
>in the future you will pay for "premium services" in Session, for example

About I2P, they say:
"...a network constructed from financial incentives rather than altruism can achieve a greater resilience against attacks, while providing a more reliable service."
https://docs.loki.network/Lokinet/LLARP/#invisible-internet-project-i2p

Should we trust them? I'm not convinced.
Replies: >>1898 >>3029
>>1818
How did the police officer rape the nurse using the internet and why is it the internet's fault that he raped her and/or was able to rape her?
>>1868
>From what I could understand, Lokinet is a for-profit Tor network.
The idea came from I2P having so much code bloat that updating cryptography standard was a mammoth task, if I remember right. So no, it's quite different.
>Should we trust them? I'm not convinced.
I think I2P is mostly funded by meager donations and is primarily a research project, but the Tor Project organization definitely gets more funding and it's extremely hard to track who and where it's coming from. So if you want to compare Tor and Lokinet, it's about the same level of trust - which is, as little as you can afford.
Replies: >>1932
>>1898
The thing is: anyone can roll a Tor node.
Replies: >>1940
>>1932
Is that not the same for Lokinet?
Replies: >>1948
>>1940
Only if you pay some Oxen.
Replies: >>1953 >>2169
>>1948
>decide to check up on Lokinet
>mentions of combined garlic and onion routing, I2P gone
>backed by some crypto
>3000-14000$ to run a service node
Holy fucking shit, I forgot about it for a year and now I get this.
Replies: >>7047
A nice website listing the different alt nets, a little rough looking though.
https://letsdecentralize.org
I think lokinet should get a mention as well
Replies: >>2047
>>1992

Check out mazerunner, it's a hybrid take on garlic and onion routing, and uses a regenerative model for building relays. Worth a shot.

pastebin (dot) com / kGAbqzc9
Replies: >>2078
>>2047

I second this, they have an official repo up atm 

https://github.com/w3nmoon/maze-runner-core

This is still very very experimental though.. :-/
>>1948
>oyyy vey you can't just run a node for free
>remember the six million sybil attacks
>you have to buy this coin that's mostly in the hands of the devs
>it's not a pyramid scheme stupid goy
>even though 5% of every block reward goes straight to their "foundation"
If they weren't running a con they would have used ETH or any DeFi shitcoin, not rolled their own. Is there anything like i2p, but a clean redesign? I'm looking for a similar garlic routed network with UDP support that doesn't get updated at the speed of molasses.
Replies: >>2228
goy_vey.jpg
[Hide] (49.4KB, 440x515)
>>2169
oy vey how dare you GOY. Ban this vicious anti semite at once fa ruining our ponzi.
>>1818
How the hell does this law make sense
Replies: >>2313
>>2312
Because it's the UK.
>>1868
Realistically nobody would use this crap. Just more ways to look like a clown.
"LLARP"
Noice.
https://github.com/BeechatNetworkSystemsLtd
>zeronet
is dead
Replies: >>3874 >>4561
>>3867
>>zeronet
Zeronet can also leak your IP address
Replies: >>4561
>>3874
>>3867
>a software akin to limewire where it's independent of some random server
>dies
Two different ballparks but the sentiment still is the same. The feds are attacking any place that is truly independent. 
<cp might be on ur computer due to it being p2p AND they leaked your IP!
<better not click anything goy!

Maybe disable images and video I guess. No file sharing, just text. Problem solved. No moar cheese pizzas on your hard drive that you could have encrypted anyway.
>>769 (OP) 
Personal experience. Add ons and 3rd party extensions are needed to make Freenet  a bit more secure. By default, Freenet is trackable by State level authorities and constantly monitored. 
https://www.theregister.com/2005/05/13/freener_not_so_anonymous/

This might help you more tech savvy fuckers. I'm just a random dork.
Just heard of this Locutus thing by the creator of Freenet, Ian Clarke. Any thoughts?

https://github.com/freenet/locutus
Replies: >>6829 >>6831
>>6828
>rust faggotry
>discord
>web assembly
Holy shit. I have never seen anything gayer than this for a while.
That aside, I don't see anonymity in their model. A counter censorship overlay network ideally should ideally provide:
>anonymity
The network/protocol does not provide information that can lead to identification of sender and receiver  by the sender, receiver and anyone else.
>security & data integrity
The network/protocol ensures only the receiver (maybe not even the sender) can access the information from the sender. The data is possible to be tempered at the same time.
>plausible deniability
Anyone on the network should be able to plausibly deny transmitting any specific data or even the fact of using the network.
Applications written for the network should be providing:
>possibility of independent authentication
When the user wants to use a tripcode/public key, he should be able to and with confidence that practically noone else can use that identifier.
>decentralization
Programs should be written in a way such that data is not centralized to one place. Data integrity and authentication can be used to ensure identity of the re-transmitted message.
Replies: >>6830 >>6832
>>6829
data is *not possible to be tempered at the same time
>>6828
>Just heard of this Locutus thing by the creator of Freenet, Ian Clarke. Any thoughts?
Freenet's design was so fundamentally broken they had to stop referring to it as "anonymous" on their website after everyone got v&ed. That's my first thought.
>>6829
> I don't see anonymity in their model
Me neither. It's probably the same trick as freenet: the only way to use the network securely is to only connect to nodes you already know and trust not to attack you ("""darknet mode""").
1605905818771_(caesium.app_LL).png
[Hide] (482.6KB, 590x1024)
Replies: >>7046
Torah-torrc.jpg
[Hide] (27.3KB, 512x512)
> What are some good torrc configurations / flags  that improve things?

Obviously the default is good but sometimes depending on what your doing you may need to change it like for example you want to make sure your "Destination IP" stays that of a certain country {ua} or countries. 
 

> Specificly I think using ExitNodes {all},{the},{countries},{you},{want},{with the ones you dont want like 14-9-5 eyes} StrictNodes 1 is better then using ExcludeNodes {of the countries you don't want}

Example:

Exclude 14-Eyes + other non desirable Exit Nodes

ExitNodes {af},{al},{dz},{ad},{ao},{ag},{ar},{am},{at},{az},{bs},{bh},{bd},{bb},{by},{bz},{bj},{bt}{bo}{ba},{bw},{br},{bn},{bg},{bf},{bi},{cv},{kh},{cm},{cf},{td},{cl},{co},{km},{cg},{cr},{hr},{cu},{cy},{cz},{dj},{dm},{do},{ec},{eg},{sv},{gq},{er},{ee},{sz},{et},{fj},{fi},{ga},{gm},{ge},{gh},{gr},{gd},{gt},{gn},{gw},{gy},{ht},{hn},{hu},{is},{in},{id},{ir},{iq},{ie},{jm},{jo},{kz},{ke},{ki},{kw},{kg},{la},{lv},{lb},{ls},{lr},{ly},{li},{lt},{lu},{mg},{mw},{my},{mv},{ml},{mt},{mh},{mr},{mu},{mx},{md},{mc},{mn},{me},{ma},{mz},{na},{nr},{np},{ni},{ne},{ng},{mk},{om},{pk},{pw},{pa},{pg},{py},{pe},{ph},{pl},{pt},{qa},{ro},{rw},{kn},{lc},{vc},{ws},{sm},{st},{sn},{rs},{sc},{sl},{sg},{sk},{si},{sb},{so},{za},{kr},{sd},{lk},{sd},{sr},{ch},{sy},{tj},{tz},{th},{tl},{tg},{to},{tt},{tn},{tr},{tm},{tv},{ug},{ua},{uy},{uz},{vu},{ve},{vn},{ye},{zm},{zw} StrictNodes 1

But if your not using bridges then using ExcludeNodes for  middle nodes is ok then

like ExcludeNodes {de},{??} or something etc

However the only thing is sometimes when using Onions the exits set gets ignored and uses nodes specifly excluded?

> Besides specifing Nodes what other flags are useful or can help you?

> Breifly remember (too lazy to look up) their was a way to reject relays that were on Windoze computers or older versions of Tor? 

> Furthermore is there a way to restrict/block relays that not configured correctly (maybe on purpose) that are using Google DNS 8.8.8.8 or Cloudflares 1.1.1.1 ?

> Or block relays that are on AWS ((( amazon ))) or Azure ((( Micro$oft ))) ???

Post Good Torrc Examples or Information!


Post Good Torrc config Examples or Information!
>>6867

Baofengs are great but not trying to get bleached
>>1953

Problem with lokinet is if you don't set the exitnode manually or in the Loki Config file (idk what its called its equivilent to Tor's torrc) you will be using your real IP so.

Also they hardly have any public Exitnodes listed

Lokinet is unpolsished and no finished but remember it uses UDP not TCP like Tor ....It basically like a Decentralized Cyrpto Multihop VPN in which you can set up to 12 hops I believe....setting 4-6 is better imo
>>7045
Governments bend and break their own laws. Why would any government give a fuck about  laws of countries that won't play ball with them? Nothing's stopping them from hosting nodes in "good" countries.  Is blocking nodes a meme? It creates a smaller pool of nodes, so glow niggers would need less to have majority control.
Replies: >>7067
>>7050
Thats absolutely true but if one needs to not have a "Desitnation IP" from their Country they may need it or a website may be gay and block certain IPs from veiwing certain content. 
> To use Shiddit you need to maintain the same country IP each Time when creating a new account or you will get shadowbanned by the API.
> One needs to be safe when looking at r/CovidVaccinated and posting on r/twinks
Have you ever got this content is blocked in your country before?
Specificly like Germany and labeling stuff holocaust denial.
> German Nodes {de} make up 30% of whole Tor Network or somting like dat
> just curious of what torrc configs/flags might be good that are not default or may be overlooked by Tor devs too busy dying their hair pink and attending BLM protests.
>>7091
>ExitNodes {ua} StrictNodes 1
nah doode FSB all the way 
EntryNodes {ru} StrictNodes 1
ExcludeNodes {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es},{jp},{cn},{tw},{kp},{sg},{il},{sa},{ae}{??}
ExitNodes {ru} StrictNodes 1
>>7045
NodeFamily {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es},{jp}
>>7045
Maybe EnforceDistinctSubnets 1 nigger?
>>7045
EntryNodes {is},{ua},{ro},{bg},{ba},{hk},{my},{iv},{ee},{cz},{bz},{it},{md},{ph},{rs},{th},{ve},{ma},{do},{cr},{by},{ar} StrictNodes 1
ExcludeNodes {ru},{cn},{il},{sg}{sa},{ae},{tw},{kp}
ExitNodes {af},{al},{dz},{de},{dk},{ad},{ao},{ag},{ar},{am},{at},{az},{bs},{bh},{bd},{bb},{by},{se},{es},{bz},{bj},{bt}{bo}{ba},{bw},{br},{bn},{bg},{bf},{bi},{cv},{kh},{cm},{cf},{td},{cl},{co},{be},{it},{km},{cg},{cr},{hr},{cu},{cy},{cz},{dj},{dm},{do},{ec},{eg},{sv},{gq},{er},{ee},{sz},{et},{fj},{fi},{fr},{ga},{gm},{ge},{gh},{gr},{gd},{gt},{gn},{gw},{gy},{ht},{hn},{hu},{is},{in},{id},{ir},{iq},{ie},{jm},{jo},{kz},{ke},{ki},{kw},{kg},{la},{lv},{lb},{ls},{lr},{ly},{li},{lt},{lu},{no},{mg},{mw},{my},{mv},{ml},{mt},{mh},{mr},{mu},{mx},{md},{mc},{mn},{me},{ma},{mz},{na},{nr},{np},{ni},{ne},{nl},{ng},{mk},{om},{pk},{pw},{pa},{pg},{py},{pe},{ph},{pl},{pt},{qa},{ro},{rw},{kn},{lc},{vc},{ws},{sm},{st},{sn},{rs},{sc},{sl},{sg},{sk},{si},{sb},{so},{za},{kr},{sd},{lk},{sd},{sr},{ch},{sy},{tj},{tz},{th},{tl},{tg},{to},{tt},{tn},{tr},{tm},{tv},{ug},{ua},{uy},{uz},{vu},{ve},{vn},{ye},{zm},{zw} StrictNodes 1
WHITE_PEOPLE,_BLACK_PEOPLE.mp4
[Hide] (4.5MB, 480x360, 00:51)
>>7091
>wh*te people
EH EH EH EH EH EH EH
Replies: >>7105
>>7104
I heard or read in manpages that ExcludeExitNodes {us},{ca},{gb},{au},{nz},{dk},{fr},{nl},{no},{de},{be},{it},{se},{es} is not as good as using ExitNodes {shithole countries here} StictNodes 1
Its not good to have set specific "EntryNodes" as if you ever need to use bridges u will be damned!...But setting ExitNodes {specific NATO countries} is good for certain use cases.
Like you may not want the website to have certain Country IPs as "the Destination IP" or need to have same Country IPs so your account doesn't get locked lets say for things like gaybay or scamazon.
Or for >>7045 reddit spacing poster they may need to have same IP so they don't get shadowbanned by the API bot detection while looking at and posting on r/twinks
Replies: >>7107
>>7105
>ExitNodes {shithole countries here} StictNodes 1
This ^ haha
"Darknets" can't be all about the technology. You need to build your own informal network of people, based around a shared interest that requires discretion. Think of it as a manually maintained darknet inside of the darknet. This is how various "rings" operate, for better or worse. But you need to learn from them.

Building a network of people takes time and skill and maintenance. Base your network around an activity of shared interest which also has potential for a lot of spin-offs. It has to be something that involves money changing hands so that it eventually begins to attract people on its own momentum.

I suggest gambling. Build a gambling network, but start with something small and silly. Place bets using small amounts of shit crypto that anyone can get just by watching ads. Bet on stupid bullshit like sports & celebrity, but also more serious things like politics and war. As the network grows more serious and more money changes hands you can branch out into other kinds of money-making schemes and add more variety to your network.

I've read through some academic & law enforcement papers on how p3d0 rings operate on the darknet. They fit the meta criteria of the kind of network I'm talking about. I even made a list of the common features that bind them together (aside from the obvious one) and how one builds trust between anonymous individuals.

I'll post it if anyone gives a shit. But I just needed to get that off my chest. It's the Achilles Heel of every discussion I see on what is the best darknet or how to build a better one. Think about the specific human activities that the darknet is used for (shit-posting doesn't count) and leverage it.
Replies: >>7550
>>7549
Post it. How do you mitigate against infiltration? Any secret club suffers from the same problem, that friend's friend may not be your friend.
Replies: >>7568 >>7588 >>7901
Trust_and_Relationship_Development_Among_Users_in_Dark_Web_Child_Sexual_Exploitation_and_Abuse_Networks.pdf
(771.1KB)
Internet_Child_Sex_Offenders_Concerns_about_Online_Security_and_their_Use_of_Identity_Protection_Technologies.pdf
(197KB)
>>7550
>How do you mitigate against infiltration?

You need to be realistic about the actual threat level. Feds are combing through the darknet to find pedos, terrorists, drug dealers and arms dealers. If you're not in those categories you're already fairly safe unless you're literally TRYING to be an idiot. Just don't talk about your personal life. Alternatively you could invent a fictional personal life and talk about that one. If you're too lazy for that you could borrow the details of some other assholes personal life, preferably someone you hate, and talk about it like it's your personal life. Drop enough clues for the feds to find him and you can kill two birds with one stone.

The thing about infiltration by law enforcement into any sort of illegal network is they're only going after a small number of people. Their goal is to shut down the network. If it's a CP community they want to catch the small minority of users who upload most of the material. If it's an illegal market they want to bust the vendors who do most of the selling. If you're just a small fry on a network that is itself a small fry compared to other kinds of networks, you don't have a lot to worry about.

Here's what I've gleaned from academic papers about CP communities on how they build trust within their anonymous networks. I've chosen to focus on them because these are people who know for 110% certainty that they are being watched by the feds and also talking to feds. The communities that flourished were characterized by:

Good sense of humor
Socially active users
Many connections
Provide validation, understanding, normalization & camradery for marginalized opinions & interests
Provide ways to gain status within the network
Provide knowledge and expertise to new members
Provide fresh new content
Share personal interests outside of the purpose of the network (catching up)
Adopt language to differentiate between ourselves and the outside world
Appeal to collecting behavior
Use content to facilitate social relationships
Trade privately
Growth should be moderate and sustained, not happen in staggered bursts
Members should be monitored for their behavior, levels of engagement, trust-worthiness
Motivations behind darknet "criminal" networks include
    Freedom of information
    Defiance of authority
    Sexual gratification
    Profit
    Technological prowess
Nurture positive roles and openness
Letting people in for money doesn't foster trust
Trustworthiness grounded in humor and sarcasm
Shared vision, perceived responsiveness and knowledge growth
Elaborate trust-building requirements
Need both interpersonal trust and institutional trust (reputation system)
Replies: >>7588
>>7550
>>7568

I think intelligence agencies target 8chan-affiliated imageboards because they know a significant proportion of the userbase are: 
>males
>autistic or mentally ill
>between the ages of 16 and 30
>have trouble finding romantic partners
>white
They understand how and what to manipulate this psychological profile into. For example, they want to groom the next mass murderer so the media runs a story about gun violence. Therefore, gun control legislation forced on the table. 
They don't target female-dominated imageboards in the same ways nearly as much because it is rare (compared to male incidence rates) for women commit violent crimes. And it is especially the case that autistic individuals develop fixations and obsessions that normal people do not.
Even though a userbase is anonymous, it doesn't mean more general attributes of it can be defined. They can, for example, measure a userbase is male by sexual interests (posting pornography), young adults (entertainment media), white, and so forth. 
Historically, posting porn, depressive relationshit, nazi larping has identified and defined what would ordinarily be a nebuluous and undefined userbase. (They can't manipulate what isn't be defined as easily.)
Replies: >>7680
>>7588
>between the ages of 16 and 30
lol
>white
lol
>>7550
>How do you mitigate against infiltration?
The grugq did a good writup of a usenet pedogroup.

<Vetting
<* Demonstrate active participation in the “trading scene”
<* Invited by existing member
<* Must exhibit deep domain specific knowledge via timed written test

<The members who were caught were those who violated the security SOP of the group:
<* Accessing a newsgroup server without using Tor (e.g. VPN, or directly)
<* Revealing personal details about themselves
<* Contacting each other outside the group’s secure comms channel

https://web.archive.org/web/20131216001415/https://grugq.github.io/blog/2013/12/01/yardbirds-effective-usenet-tradecraft/
Replies: >>7912
>>7901
The link is a wonderland, thanks.
Replies: >>7940
>>7912
He's always been good but the last writing there is from 2013. Who is the new shit?
A few new IPFS apps have appeared on f-droid
4774bb620fb38e4a20e00b26871f38f28062f0e07d341f72842ed2ed9ff745e0.png
[Hide] (647KB, 852x1280)
6a4ef9bb24bc59034a1521e77d37dfe702c87d51ee6c842da1510f5c55e2ece6.jpg
[Hide] (57.2KB, 580x700)
Repost of >>>/meta/4433
First pic related is outdated by a few years. You should use the HTTP proxy 127.0.0.1:4444 instead of the SOCKS proxy since the HTTP proxy masks your browser user agent to be MYOB/6.66 (AN/ON) while the SOCKS proxy doesn't mask your browser user agent.

Here is a short tutorial on how to create an i2pd HTTP tunnel: https://i2pd.readthedocs.io/en/latest/tutorials/http/

You don't need to open the httpd port for I2P traffic on your firewall. There isn't any nginx example for this, but I have a simple static site example for OpenBSD httpd:

language: json
server "zmjdpytveh2mp6krdnlniupxnv2cgacmffhznbxvgypl63tjchfa.b32.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log
}

server "example.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log
}

You can primarily provide a B32 address link. An address helper link in addition is optional and you don't need a registry service since the short domains are added to the user's local addressbook when an address helper link is clicked.
The i2pd webconsole listens on port 7070 by default. If you need to access the i2pd webconsole on your local machine web browser, use a SSH tunnel:

language: bash
ssh -NL 7073:localhost:7070 [insert server IP]

These instructions below assume you are using a SSH tunnel for the webconsole.

To generate an addresshelper, visit this page of the i2pd webconsole http://127.0.0.1:7073/?page=i2p_tunnels and click on your server tunnel hotlink. Copy the Base64 hash and paste it into the below link to create an address helper:
http://example.i2p/?i2paddresshelper=[Insert Base64 hash here]

The only decent I2P domain registry I know of is http://reg.i2p/ http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/
Their TOS states that domains with "offensive content" will be hidden from the lists, but are still searchable and can be unhidden. I don't know what is deemed "offensive content" by reg.i2p. All the other I2P domain registries will remove your domain from the database completely if they deem your content to be offensive.

To register your domain on reg.i2p, open a web browser that uses the i2pd HTTP proxy and go to the i2pd webconsole http://127.0.0.1:7073/?page=i2p_tunnels and click on your server tunnel. Click on "Address registration line" and type any name you want, then click "generate". Click on "submit" to submit to reg.i2p.
Replies: >>8175 >>8176 >>8275
>>8170
Haven't been into ip2 for quite awhile. Last time I lurked all the chans over there, it was literally ghost town. Also koh_l is a fucking low quality garbage board. I couldn't even bare lurking in there.
28bd7cbf67ee6d86bd8c56e100092d4c57ad8c02f419d30db911c34be6611f49.jpg
[Hide] (211.1KB, 1080x1222)
>>8170
Repost of >>>/meta/4439
Turns out you can leave out the "example.i2p" block from your webserver config since those kinds of addresses are simply base64 aliases to the B32 address.

The OpenBSD config would look like this now:
language: json
server "zmjdpytveh2mp6krdnlniupxnv2cgacmffhznbxvgypl63tjchfa.b32.i2p" {
        listen on * port 8080
        root "/htdocs/examplesite"
        no log
}
>>8170
>since the HTTP proxy masks your browser user agent to be MYOB/6.66 (AN/ON) while the SOCKS proxy doesn't mask your browser user agent.
ohhhhh so that's why bt.t-ru.org trackers were giving me 403 forbidden when i tried using i2p outproxy to proxy peer lists. is there any way to get user agent that can be used with i2p like torsocks can? so i can use i2p proxy like normal proxy without user agent being weird?
Replies: >>8278 >>11737
72a31429c5d9ef3d9f619d08c7d7fc4b656580c8be908a0850cd2aff6fd7efd1.png
[Hide] (288.4KB, 1280x720)
>>8275
Use the SOCKS5 proxy, port 4447
Replies: >>8353
>>8278
>Use the SOCKS
I hate modern programmers.
Replies: >>8355
>>8353
The SOCKS protocol originates from the early 90s anon.
Replies: >>11115 >>11737
>>1811
I believe one of the main things is that you get to choose what sorts of things you're hosting on your machine, instead of randomly being given a collection of data that could contain cp or something. I personally quite liked IPFS, and I wish there was an easy way to discover sites and stuff with it. Back in the day there was that IPFS imageboard (smugboard, I think) that existed as a test of sorts. It would be really neat to see projects like that continue.
Replies: >>11737
>>8355
Wow... So this has been going on longer than I realized
The book is broken into three parts:

    An introduction (or re-introduction) to hypermedia, with a particular focus on HTML and HTTP. We will finish this review of core hypermedia concepts by creating a simple “Web 1.0”-style application, Contact.app, for managing contacts.
    Next we will look at how we can use htmx, a hypermedia-oriented JavaScript library created by the authors of this book, to improve Contact.app. By using htmx, we will be able to achieve a level of interactivity in our application that many developers would expect to require a large, sophisticated front end library, such as React. Thanks to htmx, we will be able to do this using hypermedia as our system architecture.
    Finally, we will look at a completely different hypermedia system, Hyperview. Hyperview is a mobile hypermedia system, related to, but distinct from the web and created by one of the authors of this book — Adam Stepinski. It supports mobile specific features by providing not only a mobile specific hypermedia, but also a mobile hypermedia client. These novel components, combined with any HTTP server, make it possible to build mobile Hypermedia-Driven Applications.

https://hypermedia.systems/hypermedia-systems/
>>8355
Those damn kids and their TCP/IP back in my day we bitbanged ethernet frames over telephone wires.

>>8275
i2p will only man in the middle your user agent when connecting to eepsites. If you're connecting out to the clearnet then your user agent should be encrypted with ssl so can't be changed.

>>11112
>you get to choose what sorts of things you're hosting on your machine
That just makes you more accountable. The whole point of freenet was that in theory nobody can prove if you downloaded a thing for yourself or you're just passing it on to somebody else. The fact that ipfs doesn't work with Tor or any other kind of anonymity layer is not good either. Although I guess the thread is alternative protocols not secure alternative protocols.
Replies: >>11782
>>11737
>spoiler
I mean, in theory they can just go after everyone with that IP adress exit nodec and just sieze their shit and whack them in a blacksite.
Like that one fellawho was busted because he was the ONLY person in his university that was tor routing and got schwacked because they figured he must be the culprit.
Ideally I think  there'd be some AI algorythm to mimic normal browsing while hiding encrypted partial portions of data on what your "browsing "list.
Replies: >>11784
>>11782
> they figured he must be the culprit.
they tricked him into admitting it idiot, being on a network with thousands of people at the same time something happens doesnt mean shit its like if everyone farts in a room and you pick out a single person and say the fart that smells like cheese came from this guy cuz he farted at the same time i smelled it
https://veilid.com/
https://youtu.be/Kb1lKscAMDQ
https://veilid.com/Launch-Slides-Veilid.pdf
198905b359f0badc420a268e71c2f049a9d03ec165e05a557ad46704d1d175be.png
[Hide] (27.8KB, 673x329)
>>11822
I've seen people shilling this around. The individual technologies used are nothing new but it's quite interesting how they combine them.
I always wanted a P2P network with content addressable files and anonymity. Hopefully it will be faster than i2p.
Replies: >>11885
>>11822
>>11823
>privacy framework
>capitalism
>discord
Anon, I
Replies: >>11904 >>11905
>>11885
Can´t blame them for trying to popularize the network by using what zoomers are used to. The marketing is also not bad, honestly. Privacy became a marketing talking point and it's fashionable to talk down on technologies powered by blockchains and trying to turn a profit. But I don't really care about the social and political aspects of the project (just like I don't care about Tor promoting their network to BLM rioters), what I do care about is the technical merits. Will it scale? Does it provide real anonymity while also providing better routes to where content is stored?

I would love to hear about technical flaws in the design or implementation that could lead to de-anonymization.
Replies: >>11905
84847189-2046115150.jpg
[Hide] (41.4KB, 615x459)
>>11885
>Veilid has no profit motive, which puts us in a unique position to promote ideals without the compromise of capitalism.
If customers are not funding them then the CIA is funding them. At least Tor was started by navy intelligence to protect their own field officers. These guys just skipped straight to "hello fellow kids, wanna download our portable telephone application and talk about secret stuff, it's totally secure we promise.".

>>11904
>I would love to hear about technical flaws in the design or implementation that could lead to de-anonymization.
It looks like they literally just launched a few weeks ago so no attacks yet. But they also don't even have a whitepaper or design document. The only thing I can see is defcon slides so that's not a good start. https://veilid.com/docs/overview/

Call me a boomer but "mobile-first" is also a massive red flag since it's impossible to use a smart phone securely. Even if you degoogle/deapple you are still running on top of a propriety baseband attached to a long range radio with full access to the application processor and its memory. They know where you are at all times, they can hear everything you say through the microphones, see everything through the cameras, push code and exfil data at will. The idea of building anything private or secure ontop of a mobile platform is just ridiculous.
Replies: >>12351
>>11822
>Katelyn has dedicated her life to changing the world for the positive- between her work fighting Non-consensual pornography
So this anti-censorship project was founded by somebody who has "dedicated her life" to censoring others. That's a good start.

>Accessibility
>Types of Accessibility Challenges
>Here is a partial list of capabilities to keep in mind when designing:
Their technical documentation fits on a postcard and yet they spent time adding Americans with Disabilities Act compliance boilerplate. Tell me you're a corporate project without telling me you are a corporate project.
A projects which goal is to build a secure and private overlay network uses Dicksword as its primary channel of communication. Truly fucking amazing. They couldn't even bother to setup an XMPP or Element? Or even something like Keybase or Rocket.chat or literally any other messenger? That and the "accesibility" bullshit tells you everything you need to know about this project - stay the hell away from it
>>12252
>Therefore this is the world's most strongly anonymous chat in existence. Nothing else exists like it.
you have my interest
Replies: >>12292
>>12254
samefag it's their own ircd implementation which includes signal encryption apparently. Are those the kind of places where everyone is these days?
>>769 (OP) 
there's also hypercore protocol, an evolution of DAT

and the personal computing oriented earthstar protocol, https://earthstar-project.org/ - i used it for my chat app featured in another thread
>>11905
Indeed, not all smartphones have the modem accessing the whole of the memory, but I guess they have 3 levels of backdoors anyway. Problem being, newish CPUs have radio chips, (IME EMA AMT) and other features useful for datacenters and spying. even 50 bucks SBC have arm trustzone.
Replies: >>12597
What are your guys' thoughts on the gemini protocol?
Replies: >>12591 >>12596
>>12583
I like the idea behind the protocol but it's too barebones.
>>12583
It looked like it could've been something interesting until I came to the part where they've done fucked up by mandating TLS.

At this point I want to say fuck it. Make a simple anonymity friendly protocol light on the metadata that works on folders and files and doesn't do anything else (except maybe auth). Like FTP but not shit. Then just use .txt files in a bunch of folders. 

The blog example is too easy so let's work with a chan example. Oh you want a chan thread? Yep, that's a folder with text files. You want images? Yep, it's just image files in a directory. Wait, but how do you post? Simple. You go to a folder named "reply". You fill out a text file. You upload an image if you want. You open captcha.jpg and fill out captcha.txt. Finally you create a file called send (or fill a file called send with 1 or something. IDK go read the readme.txt). That triggers the server and kaboom! Post created. If there is an error it creates an error.txt. At the end of the day you can do fuckin everything with an arbitrary tree file system like that.

Huge advantages: You can download folders in advance. You can download threads and store them on your computer, or archive them on your own site. All 100% compatible. Oh and this means you can mount this into your file system.

The more I think about it the better this sounds actually.

Files and folders are king. Text files are king.
Replies: >>12598
scr.png
[Hide] (5.4KB, 640x480)
>>12351
Unless you got a mystery meat Linux kernel, there's nothing going on with TrustZone on an ARM SBC. It's basically an unused feature, much like bluetooth.
Replies: >>12601
>>12596
What's wrong with Zeronet?
(Also, what's wrong with TLS?)
Replies: >>12599 >>12601
>>12598
unwillingly makes you host of cp
>>12597
>Unless you got a mystery meat Linux kernel, there's nothing going on with TrustZone on an ARM SBC. 
The vendor's bootloader can load a backdoor into trustzone before handing over to your secure open source os. After than your system is compromised and there's nothing you can do about it, especially if the bootloader is locked down and will only run vendor signed code.

>>12598
>What's wrong with Zeronet?
It's basically http over bittorrent, so your entire browsing history gets broadcast to the world by design.
Replies: >>12604
foo.png
[Hide] (100.1KB, 620x460)
>>12601
The bootloader is just mainline u-boot.
So that's the least of my worries. Turns out now I can't fucken post anymore, because I'm not running a kosher botnet system. New cuckflare catpcha goes into a loop and eventually gives up. No changes whatsoever on my part. One day I could post, and the next day I couldn't.
Replies: >>12688 >>12994
>>12604
>The bootloader is just mainline u-boot.
If you can compile and flash it yourself then that's good.

>newish CPUs have radio chips, (IME EMA AMT) 
Fuck this meme won't die. Intel anti-theft system doesn't mean your CPU has a secret 3G radio inside. It means if your motherboard has a 3G module attached then your CPU will use it as part of the anti-theft system.
Replies: >>12764
>>12688
brainlet
>IME is a backdoor
midwit
>IME etc are fine
>yeah IME has an RCE vuln but it only applies to dis n dat case
bigbrain
>consumer faggot trash added directly to CPU / mobo are for fucking gigafaggots and they often backfire and turn into RCE vulns who the fuck puts a FUCKING WEB SERVER in the firmware kill yourself
Replies: >>13029
>>769 (OP) 
solar winds inside every console router every node in any kind of network every chip in existence
>>12604
>New cuckflare catpcha goes into a loop and eventually gives up
I had that issue before with zzz's chess captcha, it turns out that my system clock was ahead. Try adjusting your clock?
Replies: >>13002
>>12994
ntpd is running, and the system time seems ok. Maybe it's because of the browser (iridium) but I'm not about to install another one since it works fine for my online banking and buying stuff online.
>>12764
Your Intel CPU does not have a radio inside. Childish namecalling and fake greentext doesn't change reality.
Your ISP is already solar winds
Spoonfeed me on how to ban evade on 4ch, the mods are insufferable freaks
Replies: >>13076
>>13066
use a cellphone
Replies: >>13088
>>13076
They have rangebanned my cell ISP.
Replies: >>13095
>>13088
>They have rangebanned my cell ISP.
No they haven't. You are either using a brand new browser profile in which case you were marked as a bot. Or you are using the same browser profile in which case they know who you are and you're still banned.
Replies: >>13097
c.jpg
[Hide] (59.8KB, 622x647)
>>13095
LOL what a shithole!
[New Reply]
108 replies | 21 files
Connecting...
Show Post Actions

Actions:

Captcha:

Select the solid/filled icons
- news - rules - faq -
jschan 1.4.1