Bobinas P4G
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • People

Notices tagged with i2p

  1. Dick Smiths Fair Go Supporters (dsfgs@activism.openworlds.info)'s status on Thursday, 13-Jul-2023 20:10:18 UTC Dick Smiths Fair Go Supporters Dick Smiths Fair Go Supporters
    • Sadie Mascis

    @sadiedoreen
    Yes, we are happy to see a #fediverse instance embracing #I2P, its called #Epicyon and it doesn't require Javascript.

    * All we need are more people running servers! More information is available at libreserver.org

    * A mayor candidate in Adelaide ran last year and they use XMPP messaging over I2P!

    * Need to #torrent files, #useI2P

    * Need a #translation? Find one of I2P's translate sites.

    I2P is #theInternet you dreamt of.

    In conversation Thursday, 13-Jul-2023 20:10:18 UTC from activism.openworlds.info permalink
  2. (RTP):tor:Privacy & Tech Tips (rtp@fosstodon.org)'s status on Tuesday, 07-Mar-2023 02:16:39 UTC (RTP):tor:Privacy & Tech Tips (RTP):tor:Privacy & Tech Tips

    On #DataPrivacyDay..

    SIMPLE STEPS:

    * Turn Off Bluetooth (use headphone jack if possible)

    * Don't overshare perm mac & Turn Off WiFi w/not in use (wipri -w does both automatically for #linux / linux phones - phone apps exist)

    * Use #Tor / #I2P - Hidden Services w/Possible (e2ee) - detach ID

    * Use Frontends For Searching Big Tech (ex: #Whoogle, #Invidious, #nitter)

    * Compartmentalize (container, profiles, sandbox)

    * #e2ee / #Encryption

    #Privacy
    📝 PUBLIC TUTORIALS: https://buymeacoffee.com/politictech/posts

    In conversation Tuesday, 07-Mar-2023 02:16:39 UTC from fosstodon.org permalink

    Attachments


    1. https://cdn.fosstodon.org/media_attachments/files/109/768/998/695/723/442/original/bcbcbc1b956bab87.png
    2. Posts | 🥷 (RTP) Privacy Tech Tips 📡
      from @buymeacoffee
      Buy 🥷 (RTP) Privacy Tech Tips 📡 a coffee. Join 58 other supporters and enjoy exclusive content, leave a positive note and more.
  3. (RTP):tor:Privacy & Tech Tips (rtp@fosstodon.org)'s status on Tuesday, 07-Mar-2023 02:16:37 UTC (RTP):tor:Privacy & Tech Tips (RTP):tor:Privacy & Tech Tips
    in reply to

    💡VIDEO: Make I2P Desktop Shortcut (all in one), Starts i2prouter & dedicated I2P Librewolf Browser Profile & Stops i2prouter on browser close

    #Tutorial #Infosec #Cybersecurity #HumanRights #I2P #privacy #anonymous #anonymity #bash #Librewolf #firefox

    📺 WATCH (public): https://www.buymeacoffee.com/politictech/create-automated-i2p-browser-button-on-desktop

    In conversation Tuesday, 07-Mar-2023 02:16:37 UTC from fosstodon.org permalink

    Attachments


    1. https://cdn.fosstodon.org/media_attachments/files/109/830/837/539/180/498/original/533e97a1c3f3ca8b.png
    2. 💡 📺 Create Automated I2P Browser Button On Desktop — 🥷 (RTP) Privacy Tech Tips 📡
      from @buymeacoffee
      Hey everyone, 😎I2P: not just for privacy / anonymity practices. It's also a network / protocol of opportunity. With the potential of...
  4. (RTP):tor:Privacy & Tech Tips (rtp@fosstodon.org)'s status on Tuesday, 07-Mar-2023 02:16:36 UTC (RTP):tor:Privacy & Tech Tips (RTP):tor:Privacy & Tech Tips
    in reply to

    🧄 #I2P Browser Button Tutorial For #Pinephone / #Linux Phones / Devices

    Includes :librewolf: #Librewolf profile pre-setup + desktop shortcut + icon + starting script starts #i2prouter upon browser open & stops i2prouter on browser close

    #Tutorial #privacy #I2P #anonymity #HumanRights #p2p #proxy #anonymous #Pinephone #decentralization #crypto #encryption

    📝 Tutorial / 📸 Photos:

    https://www.buymeacoffee.com/politictech/setup-automated-i2p-browser-librewolf-on-pinephone-linux-phones-devices (public)

    In conversation Tuesday, 07-Mar-2023 02:16:36 UTC from fosstodon.org permalink

    Attachments


    1. https://cdn.fosstodon.org/media_attachments/files/109/861/152/782/387/646/original/b2cf8baea40e2ce7.png

    2. https://cdn.fosstodon.org/media_attachments/files/109/861/185/224/755/072/original/37fe57a0967294b2.png
  5. LisPi (lispi314@mastodon.top)'s status on Sunday, 05-Mar-2023 04:35:29 UTC LisPi LisPi

    Pro-tip for admins: Enable users to access your resources through #anonymization networks.

    The wider the use of #Anonymity tools, the more effective they get. Some use them for normal #privacy, others to stay alive.

    Among the lowest friction for adoption are #Tor and #I2P. A #proxy network and a #mixnet, respectively. These are low-latency networks compatible with conventional TCP/IP protocols.

    Allow the use of #API clients, so that fingerprinting of users is harder.

    In conversation Sunday, 05-Mar-2023 04:35:29 UTC from mastodon.top permalink
  6. rtfm (rtfm@neue.city)'s status on Wednesday, 04-May-2022 12:32:53 UTC rtfm rtfm
    • :arch: Moribundo Insurgente
    @moribundo ¿cómo puedes hacer fallar/prohibir #YaCy si no hay servidores centrales? ¿cómo hacer que #TahoeLAFS o #Freenet dejen de funcionar si no hay autoridades centrales? ¿como censurar #Twister si no hay quien pueda censurar, ni servidores 24/7? ¿cómo perseguir los mensajes de #Jami o de #Tox o los mails de #Bitmessage si van cifrados?

    Si CIENTOS de millones de PCs privados se apagan en una region porque es de noche y otros cientos de millones de PCs se encienden porque se hace de día es imposible "prohibir"

    ¿Cómo prohibir los mensajes que se publican en la #RRSS de #I2P o Freenet cuando es casi imposible conocer a los autores o conectar a un mensaje con un posible autor?

    De hecho solo una pequeña parte de las redes #P2P deben compartir archivos al estilo de #Bittorrent o #eMule, la mayoría solo comparte bits y nada mas.
    In conversation Wednesday, 04-May-2022 12:32:53 UTC from neue.city permalink
  7. rtfm (rtfm@neue.city)'s status on Wednesday, 16-Feb-2022 22:31:23 UTC rtfm rtfm
    • Claudio Segovia
    #Retroshare es una plataforma similar a la de #Bittorrent y #eMule, o sea, una herramienta casi #P2P para intercambiar archivos, chatear, intercambiar mensajes (email), foros, compartir enlaces, etc
    En este sentido es una solucion Todo-En-Uno

    La diferencia con los modelos P2P (pares iguales o peer 2 peer) es que en RS, se usa el #F2F (friend 2 friend o pares amigos)

    Ejemplo:
    - en BT generalmente tienes en cada archivo .torrent uno o mas servidores que te ayudan a contactar mas facilmente a otros pares. Solo en #I2P, bittorrent es #anonimo
    - en RS necesitas 1ro añadir a pares amigos y de esta forma puedes acceder a todas sus funciones. Asi ya no requieres que te den el enlace del o los archivos que quieres bajar, sino simplemente usas el buscador. En la documentacion recomiendan añadir entre 10 y 15 pares amigos a la lista. RS en modo #Tor o #I2P es anonimo. Para añadir pares amigos tienes 2 caminos: (1) añadir directamente si conoces a alguien que use RS o (2) añadir un "servidor chat" desde https://retroshare.ch/invite y una vez dentro de RS veras aparecer varias salas de chat donde podras intercambiar tu certificado de amistad y asi añadir mas "pares amigos". Para este metodo, te recomiendo usar Tor o I2P

    Mientras BT/eMule no logren encontrar un camino para el intercambio de archivos de forma segura y anonima, se mantendran relativamente restringidos a las regiones donde no son criminalizados

    @claudiosegovia
    In conversation Wednesday, 16-Feb-2022 22:31:23 UTC from neue.city permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Retroshare Chat Server
  8. Konrad Bächler :linuxmintnew: (konrad@fosstodon.org)'s status on Saturday, 09-Oct-2021 11:03:17 UTC Konrad Bächler :linuxmintnew: Konrad Bächler :linuxmintnew:
    • I2P

    #Tails 4.23 came out this week 🌈🎉. To those which are waiting to finally have #i2p by default on board of Tails - there is some great work going on.

    Now it is also possible to use the out-of-the-box #torbrowser together with #i2p on tails. See here: https://codeberg.org/diva.exchange/i2p/issues/9#issuecomment-269231

    Packaging of these great features is still open, though. #privacy #security @i2p

    In conversation Saturday, 09-Oct-2021 11:03:17 UTC from fosstodon.org permalink

    Attachments

    1. Packaging for Tails
      from diva.exchange
      # Project: I2Pd package for Tails Related: https://gitlab.tails.boum.org/tails/tails/-/issues/12264#note_150424 Target: having an up-to-date I2Pd package (a deb) for tails available from a suitable repo. The problems: * Tails is debian based (which is great) - but as of today - the I2P package is rather outdated. * Tails is heavily relying on iptables to control and secure the network of the system. This approach is fine from a tails perspective. I2P should therefore simply run in a sandbox with clearly defined interfaces to the host. The I2P sandbox itself needs full network access (tcp/udp). In the I2P jargon this is called NTCP and SSU. As a **prototype** this approach is working (tested on tails 4.7): Execute as root: ``` apt-get install i2pd systemctl stop i2pd ``` THEN: 1. fix the systemd i2pd.service file, see below 2. fix /etc/i2pd/i2pd.conf, see below 3. empty /etc/i2pd/tunnels.conf (currently not needed for the prototype) Execute as root: ``` iptables -I OUTPUT 3 -p tcp -d 127.0.0.1 -j ACCEPT -m tcp --tcp-flags SYN,ACK,FIN,RST SYN -m multiport --destination-ports 4444,4447,7070 -m owner --uid-owner amnesia iptables -I OUTPUT 4 -p tcp -j ACCEPT -m owner --uid-owner i2pd iptables -I OUTPUT 5 -p udp -j ACCEPT -m owner --uid-owner i2pd systemctl start i2pd ``` Go get a tea and wait for a few minutes until I2Pd has integrated into the I2P network. Test as user amnesia: ``` curl -x localhost:4444 http://diva.i2p > diva.i2p.html more diva.i2p.html ``` ## systemd i2pd.service file ``` [Unit] Description=I2P Router written in C++ Documentation=man:i2pd(1) https://i2pd.readthedocs.io/en/latest/ After=network.target [Service] User=i2pd Group=i2pd RuntimeDirectory=i2pd RuntimeDirectoryMode=0700 LogsDirectory=i2pd LogsDirectoryMode=0700 Type=forking ExecStart=/usr/sbin/i2pd --conf=/etc/i2pd/i2pd.conf --pidfile=/run/i2pd/i2pd.pid --logfile=/var/log/i2pd/i2pd.log --daemon --service ExecReload=/bin/kill -HUP $MAINPID PIDFile=/run/i2pd/i2pd.pid ### Uncomment, if auto restart needed #Restart=on-failure KillSignal=SIGQUIT # If you have the patience waiting 10 min on restarting/stopping it, uncomment this. # i2pd stops accepting new tunnels and waits ~10 min while old ones do not die. #KillSignal=SIGINT #TimeoutStopSec=10m # If you have problems with hanging i2pd, you can try increase this LimitNOFILE=4096 # To enable write of coredump uncomment this #LimitCORE=infinity PrivateDevices=yes [Install] WantedBy=multi-user.target ``` ## /etc/i2pd/i2pd.conf file ``` ## Configuration file for a typical i2pd user ## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/ ## for more options you can use in this file. ## Lines that begin with "## " try to explain what's going on. Lines ## that begin with just "#" are disabled commands: you can enable them ## by removing the "#" symbol. ## Tunnels config file ## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf # tunconf = /var/lib/i2pd/tunnels.conf ## Tunnels config files path ## Use that path to store separated tunnels in different config files. ## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d # tunnelsdir = /var/lib/i2pd/tunnels.conf.d ## Where to write pidfile (don't write by default) # pidfile = /var/run/i2pd.pid ## Logging configuration section ## By default logs go to stdout with level 'info' and higher ## ## Logs destination (valid values: stdout, file, syslog) ## * stdout - print log entries to stdout ## * file - log entries to a file ## * syslog - use syslog, see man 3 syslog # log = file ## Path to logfile (default - autodetect) # logfile = /var/log/i2pd.log ## Log messages above this level (debug, *info, warn, error, none) ## If you set it to none, logging will be disabled loglevel = debug ## Write full CLF-formatted date and time to log (default: write only time) # logclftime = true ## Daemon mode. Router will go to background after start # daemon = true ## Specify a family, router belongs to (default - none) # family = ## External IP address to listen for connections ## By default i2pd sets IP automatically # host = 1.2.3.4 ## Port to listen for connections ## By default i2pd picks random port. You MUST pick a random number too, ## don't just uncomment this # port = 4567 ## Enable communication through ipv4 ipv4 = true ## Enable communication through ipv6 ipv6 = false ## Network interface to bind to # ifname = ## You can specify different interfaces for IPv4 and IPv6 # ifname4 = # ifname6 = ## Enable NTCP transport (default = true) ntcp = true ## If you run i2pd behind a proxy server, you can only use NTCP transport with ntcpproxy option ## Should be http://address:port or socks://address:port # ntcpproxy = socks://localhost:9050 ## Enable SSU transport (default = true) ssu = true ## Should we assume we are behind NAT? (false only in MeshNet) # nat = true ## Bandwidth configuration ## L limit bandwidth to 32KBs/sec, O - to 256KBs/sec, P - to 2048KBs/sec, ## X - unlimited ## Default is X for floodfill, L for regular node bandwidth = P ## Max % of bandwidth limit for transit. 0-100. 100 by default share = 50 ## Router will not accept transit tunnels, disabling transit traffic completely ## (default = false) # notransit = true ## Router will be floodfill # floodfill = true [http] ## Web Console settings ## Uncomment and set to 'false' to disable Web Console # enabled = true ## Address and port service will listen on address = 127.0.0.1 port = 7070 ## Path to web console, default "/" # webroot = / ## Uncomment following lines to enable Web Console authentication # auth = true # user = i2pd # pass = changeme [httpproxy] ## Uncomment and set to 'false' to disable HTTP Proxy # enabled = true ## Address and port service will listen on address = 127.0.0.1 port = 4444 ## Optional keys file for proxy local destination # keys = http-proxy-keys.dat ## Enable address helper for adding .i2p domains with "jump URLs" (default: true) # addresshelper = true ## Address of a proxy server inside I2P, which is used to visit regular Internet # outproxy = http://false.i2p ## httpproxy section also accepts I2CP parameters, like "inbound.length" etc. [socksproxy] ## Uncomment and set to 'false' to disable SOCKS Proxy # enabled = true ## Address and port service will listen on address = 127.0.0.1 port = 4447 ## Optional keys file for proxy local destination # keys = socks-proxy-keys.dat ## Socks outproxy. Example below is set to use Tor for all connections except i2p ## Uncomment and set to 'true' to enable using of SOCKS outproxy # outproxy.enabled = false ## Address and port of outproxy # outproxy = 127.0.0.1 # outproxyport = 9050 ## socksproxy section also accepts I2CP parameters, like "inbound.length" etc. [sam] ## Uncomment and set to 'true' to enable SAM Bridge enabled = false ## Address and port service will listen on # address = 127.0.0.1 # port = 7656 [bob] ## Uncomment and set to 'true' to enable BOB command channel enabled = false ## Address and port service will listen on # address = 127.0.0.1 # port = 2827 [i2cp] ## Uncomment and set to 'true' to enable I2CP protocol enabled = false ## Address and port service will listen on # address = 127.0.0.1 # port = 7654 [i2pcontrol] ## Uncomment and set to 'true' to enable I2PControl protocol enabled = false ## Address and port service will listen on # address = 127.0.0.1 # port = 7650 ## Authentication password. "itoopie" by default # password = itoopie [precomputation] ## Enable or disable elgamal precomputation table ## By default, enabled on i386 hosts # elgamal = true [upnp] ## Enable or disable UPnP: automatic port forwarding (enabled by default in WINDOWS, ANDROID) enabled = false ## Name i2pd appears in UPnP forwardings list (default = I2Pd) # name = I2Pd [reseed] ## Options for bootstrapping into I2P network, aka reseeding ## Enable or disable reseed data verification. verify = false ## URLs to request reseed data from, separated by comma ## Default: "mainline" I2P Network reseeds # urls = https://reseed.i2p-projekt.de/,https://i2p.mooo.com/netDb/,https://netdb.i2p2.no/ urls = https://reseed.diva.exchange/ ## Path to local reseed data file (.su3) for manual reseeding # file = /path/to/i2pseeds.su3 ## or HTTPS URL to reseed from # file = https://legit-website.com/i2pseeds.su3 ## Path to local ZIP file or HTTPS URL to reseed from # zipfile = /path/to/netDb.zip ## If you run i2pd behind a proxy server, set proxy server for reseeding here ## Should be http://address:port or socks://address:port proxy = socks://localhost:9050 ## Minimum number of known routers, below which i2pd triggers reseeding. 25 by default # threshold = 25 [addressbook] ## AddressBook subscription URL for initial setup ## Default: inr.i2p at "mainline" I2P Network # defaulturl = http://joajgazyztfssty4w2on5oaqksz6tqoxbduy553y34mf4byv6gpq.b32.i2p/export/alive-hosts.txt ## Optional subscriptions URLs, separated by comma # subscriptions = http://inr.i2p/export/alive-hosts.txt,http://stats.i2p/cgi-bin/newhosts.txt,http://rus.i2p/hosts.txt [limits] ## Maximum active transit sessions (default:2500) # transittunnels = 2500 ## Limit number of open file descriptors (0 - use system limit) # openfiles = 0 ## Maximum size of corefile in Kb (0 - use system limit) # coresize = 0 ## Threshold to start probabalistic backoff with ntcp sessions (0 - use system limit) # ntcpsoft = 0 ## Maximum number of ntcp sessions (0 - use system limit) # ntcphard = 0 [trust] ## Enable explicit trust options. false by default # enabled = true ## Make direct I2P connections only to routers in specified Family. # family = MyFamily ## Make direct I2P connections only to routers specified here. Comma separated list of base64 identities. # routers = ## Should we hide our router from other routers? false by default # hidden = true [exploratory] ## Exploratory tunnels settings with default values # inbound.length = 2 # inbound.quantity = 3 # outbound.length = 2 # outbound.quantity = 3 [persist] ## Save peer profiles on disk (default: true) # profiles = true ```
  9. briar@fosstodon.org's status on Thursday, 07-Oct-2021 13:56:58 UTC briar briar

    In case you like #i2p, you may like to learn that there's a ticket to implement I2P as a plugin for #Briar.

    No one working at it atm, but if you know someone who is interested in such, Briar will support it:
    https://code.briarproject.org/briar/briar/-/issues/187

    In conversation Thursday, 07-Oct-2021 13:56:58 UTC from fosstodon.org permalink

    Attachments

    1. Implement I2P plugin (#187) · Issues · briar / briar
      @akwizgran expressed a keen interest in this happening eventually. The basic idea is to add I2P as a transport,...
  10. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 12:50:31 UTC Federation Bot Federation Bot

    Trending tags:
    #martesdebarbas
    #irc
    #i2p

    In conversation Tuesday, 13-Aug-2019 12:50:31 UTC from mastodon.host permalink
  11. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 11:50:13 UTC Federation Bot Federation Bot

    Trending tags:
    #martesdebarbas
    #irc
    #i2p
    #bahn
    #patreon

    In conversation Tuesday, 13-Aug-2019 11:50:13 UTC from mastodon.host permalink
  12. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 10:50:45 UTC Federation Bot Federation Bot

    Trending tags:
    #martesdebarbas
    #irc
    #i2p
    #patreon

    In conversation Tuesday, 13-Aug-2019 10:50:45 UTC from mastodon.host permalink
  13. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 09:50:28 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat

    In conversation Tuesday, 13-Aug-2019 09:50:28 UTC from mastodon.host permalink
  14. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 08:45:38 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #bahn
    #ebola

    In conversation Tuesday, 13-Aug-2019 08:45:38 UTC from mastodon.host permalink
  15. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 07:45:57 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #ebola
    #stars
    #patreon

    In conversation Tuesday, 13-Aug-2019 07:45:57 UTC from mastodon.host permalink
  16. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 06:40:41 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #ebola
    #stars

    In conversation Tuesday, 13-Aug-2019 06:40:41 UTC from mastodon.host permalink
  17. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 05:40:25 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #ebola
    #summer

    In conversation Tuesday, 13-Aug-2019 05:40:25 UTC from mastodon.host permalink
  18. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 04:40:29 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #ebola
    #summer
    #foss

    In conversation Tuesday, 13-Aug-2019 04:40:29 UTC from mastodon.host permalink
  19. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 03:35:43 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #summer
    #foss
    #verizon

    In conversation Tuesday, 13-Aug-2019 03:35:43 UTC from mastodon.host permalink
  20. Federation Bot (federationbot@mastodon.host)'s status on Tuesday, 13-Aug-2019 02:35:21 UTC Federation Bot Federation Bot

    Trending tags:
    #irc
    #i2p
    #chat
    #foss

    In conversation Tuesday, 13-Aug-2019 02:35:21 UTC from mastodon.host permalink
  • Before

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Bobinas P4G is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Bobinas P4G content and data are available under the Creative Commons Attribution 3.0 license.