Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)M
Posts
42
Comments
744
Joined
3 yr. ago

  • Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

  • Helix?

  • TOR is obvious too to someone snooping on your network, unless you're using bridges (and that's hit or miss). If you don't want someone to know you're using I2P, use OpenVPN and mask your traffic as HTTPS.

    You're going to have to explain better about "I2P not masking your traffic" and especially about "someone identifying you" - timing attacks are possible in both cases and the I2P Devs have mitigations against it. Please provide sources which define how I2P is weaker and more susceptible to TOR against network forensics

  • Please mention the "advanced features" it lacks compared to TOR. I have read the FAQ

  • I don't think I understand what you're implying. Are you arguing that PGP implements less secure operations because it doesn't have perfect forward secrecy? As far as I know there's not much out there in terms of encryption schemes for data at rest which includes PFS. Even AGE didn't have it last time I checked. If you know about something that does provide PFS for data at rest, let me know

  • PGP is the protocol, GPG is the implementation. People tend to use GPG because it is FOSS.

  • I would like for these people to never retire but we must all accept change as they come from father time

  • Possiblylinux127 seemed like he had founds faults in PGP's encryption which got me interested

  • Confirmed the troll.

    From the FAQ:

    Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

    It may be dangerous to use I2P in what the project calls "Strict Countries"

    Most I2P peers are not in those strict countries and the ones that are, are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers.

    Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - are not an inherent part of the network. Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. There are very, very few of these.

    There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy.

    If you are hosting something sensitive, then your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to real-world events could probably de-anonymize you with enough effort.

    I2P has defenses available against this like multihoming or Tahoe-LAFS

    I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination.

    In addition, you may be vulnerable to collusion between the outproxy operator and operators of other I2P services, if you use the same tunnels ("shared clients").

    In theory, if you're accessing the clearnet, then it is no better or worse than TOR. It is a little better if you're stay in I2P land.

    Don't listen to me or him. If you're reading this, go to the FAQ (https://geti2p.net/en/faq) and make your own decisions.

  • Really? Care to explain?

  • That's for encrypting text, regardless of the medium. Explain "not very good"?

  • If I understand correctly, stream isolation will route different connections through different circuits. If you're doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess

  • Can't we script a complete copy of Google maps data (shops, highways etc) to this? Is the API restricted? Can we run distributed jobs for it? I can spin up some compute if someone is interested in trying this

  • The point is not to use Gmail at all, and forwarding it isn't likely to help (this is in important places like work)

    It's about the YouTube platform. For the most part I don't pay attention to the recommendations

  • I use an MP3 player to play music in a car and I don't connect my mobile phone to the car at all.

  • Thanks edited

  • Yeah it's time and we can see it. Good luck bud and I hope you find some peace

  • Run a transparent encryption program and buy a Google drive subscription of 2TB for a year for $100.

  • Except the CLI hasn't been updated in ages

  • Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ @lemmy.dbzer0.com

    Can someone tell me the reason why these people don't want to leave Reddit?

  • Selfhosted @lemmy.world

    Open Source operating systems to run on compatible switches for homelab?