Sasecurity Wiki
Advertisement

pasatebin[]

monero[]

https://github.com/i2p-zero/i2p-zero zero dependenc i2p
https://gist.github.com/sanderfoobar/2f2f0ce7a2d099f22e55ba9e4fe1bfba This document serves as a small tutorial for new and/or existing Monero node operators who wish to support I2P users by allowing their nodes to communicate p2p through I2P. You should be able to get through this document and host an I2P node in ~20 minutes.

ca[]

https://web.archive.org/web/20140814103745/https://www.encrypteverything.ca/index.php?title=Installing_and_using_I2P

Note: Install NoScript and Cookie Whitelist, With Buttons and always keep them blocking everything while browsing Eepsites. Malicious scripts and cookies can compromise your anonymity.

For additional anonymity look at the privacy protecting add-ons on the Firefox page.

Install the Firefox add-on QuickProxy. After the add-on installs restart Firefox. After Firefox restarts, open your proxy settings by opening the "Edit" tab and going to "Preferences". Select the "Advanced" tab. What you see should look like the image below:

links[]

https://news.ycombinator.com/item?id=38026736 , https://github.com/PurpleI2P/i2pd
https://news.ycombinator.com/item?id=38029681 For those who wondering: best practical use of I2P is to tunnel SSH access to obscure devices behind NAT where you can't or dont want to use something like Tailscale. Or imagine you have that torrent box you using for seeding obscure book or music collection. You can pay for the server with crypto, but I2P is good to make sure you can access and configure it privately.

https://news.ycombinator.com/item?id=37477512, https://github.com/TryQuiet/quiet A private, p2p alternative to Slack and Discord built on Tor & IPFS

https://news.ycombinator.com/item?id=12256866, https://github.com/cjdelisle/cjdns/blob/master/doc/Whitepaper.md Cjdns implements an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. This provides near-zero-configuration networking, and prevents many of the security and scalability issues that plague existing networks. The really cool thing about this – as opposed to something like Tor or I2P – is that rather than coming up with a novel addressing scheme, it just commandeers the entire (unused[0]) fc00::/8 block of IPv6. Because of this, it is 100% compatible with every existing IPv6 application. For bonus points, it can also tunnel IPv4 and IPv6 through the P2P network[1] much like a traditional VPN would. But unlike a traditional VPN, it is sufficient to connect to any single node of the P2P network, no need for direct connectivity to the gateway. And of course that connection doesn't have to be a UDP/IP stream over the public internet, because CJDNS can speak raw Ethernet frames[2] over any hardware interface you like. https://news.ycombinator.com/from?site=github.com/cjdelisle

https://ipredia.org/os/download/

Tahoe, ssh#tor

Advertisement