- 77 Posts
- 44 Comments
I feel that I2P is missing somewhere in here too.
CAVOK@lemmy.worldto Lemmy.World Announcements@lemmy.world•[NO LONGER ACTIVE] Announcing an April charity event!1·3 months ago!whitelistsilver
CAVOK@lemmy.worldOPMto The Invisible Internet Project@lemmy.world•GitHub - altonen/emissary: Rust implementation of the I2P protocol stackEnglish1·3 months agoNot mine. I just added the news. But let’s hope the dev sees it, and that someone will help him out.
CAVOK@lemmy.worldto Privacy@lemmy.ml•John Oliver launches "Make yourself less valuable to Meta" website, suggests Signal, Mastodon, Pixelfed, and BlueSky as Meta alternatives101·4 months agoUse Magic Earth or Organic Maps instead of Google Maps too. Neither will track you.
CAVOK@lemmy.worldOPMto The Invisible Internet Project@lemmy.world•Anonymous Torrenting With I2PEnglish2·4 months agoIf people always react to you in a negative way you need to reassess the way you interact with people.
Going forward, contribute in a positive way or stay away.
CAVOK@lemmy.worldOPMto The Invisible Internet Project@lemmy.world•Anonymous Torrenting With I2PEnglish5·4 months agoWho pissed in your cereal this morning? If you don’t value privacy and anonymity online that’s fine, but why come into a community about i2p and moan about i2p? Just leave. If you’re not interested you can be that somewhere else.
CAVOK@lemmy.worldMto The Invisible Internet Project@lemmy.world•torrent client for i2pdEnglish1·4 months agoWhat’s DHT and what does it do?
CAVOK@lemmy.worldMto The Invisible Internet Project@lemmy.world•Has anyone made a Ticktok Proxy yet?English1·5 months agoSeeing how you can use i2p as a proxy for whatever you want, I assume you could just access it from your normal installation? I don’t use it so I don’t know.
CAVOK@lemmy.worldOPto Privacy@lemmy.ml•Dutch & French police take down Matrix encrypted chat app; 2.3 million messages captured221·7 months agoI don’t change the headline generally, but I also didn’t catch that it wasn’t “the real” matrix.
CAVOK@lemmy.worldOPto Privacy@lemmy.ml•Dutch & French police take down Matrix encrypted chat app; 2.3 million messages captured4·7 months agoProbably an implementation issue. Make a small error there, like storing parts of a key in memory or something like that and you’ve compromised security.
Would be cool to try that, but you need both a domain and tls keys for that, don’t you?
Especially with the Easy Install Bundle for Windows. Sets everything up for you.
If you’re using it to browse webpages on the clearnet then yes, it’s slower, because that’s not the use-case for i2p. I’ve seen speeds around 1MBit/s which isn’t lightning fast, but also not terrible for an anonymous network.
That’s because you’re using it for a purpose it wasn’t intended. I2P isn’t designed to be used to browse the regular internet, for that it’s better to use TOR. However for anonymous torrenting or accessing i2p-sites, it’s quite fast imho.
Is it much slower though? I know it was, but is it still true? I get decent speeds on my torrents.
CAVOK@lemmy.worldOPMto The Invisible Internet Project@lemmy.world•I2P 2.6.0 Release - Blog - I2PEnglish2·1 year agoThere was an attack not too long ago. I think there’s something about it here on lemmy too. But start with this link.
https://geti2p.net/en/blog/post/2023/02/09/about_the_recent_denial_of_service_attacks
CAVOK@lemmy.worldOPto Jellyfin: The Free Software Media System@lemmy.ml•Question: Jellyfin plugin repositoriesEnglish4·1 year agoI might be too dumb for jellyfin, but how do I install the jellyseerr plugin?
CAVOK@lemmy.worldOPMto The Invisible Internet Project@lemmy.world•Network Weather Update: Still Stormy, Suggested Short-Term MitigationsEnglish1·1 year agoFrom one of the developers:
Excellent question. In the case of Java I2P and of I2P+, the attacker is actually gaming the sybil attack tool in order to trick routers into erroneously banning floodfills.
Basically the attacker has found a way to trick real routers into attempting to connect to fake routers. Normally, this is not harmful, fake routers are just offline routers. Offline forever.
But if you craft your fake router this one specific way then the router you are tricking thinks some real router, which is usually reachable, is offline. That’s how it affects I2P without the sybil tool. The sybil tool, in this case, amplifies the effect of the attack and the duration of the attack, because the real router which is ddos’ed gets banned by the sybil tool.
Edit: I am deliberately leaving out specific details here.
If you have the link I’m happy to put it in the link collection here.