CAVOK

joined 1 year ago
MODERATOR OF
i2p
[–] [email protected] 2 points 6 days ago (3 children)

Especially with the Easy Install Bundle for Windows. Sets everything up for you.

[–] [email protected] 7 points 1 week ago

If you're using it to browse webpages on the clearnet then yes, it's slower, because that's not the use-case for i2p. I've seen speeds around 1MBit/s which isn't lightning fast, but also not terrible for an anonymous network.

[–] [email protected] 28 points 1 month ago

Get StreetComplete while you're at it and help improve the maps in a Pokemon-Go style mobile game.

[–] [email protected] 1 points 2 months ago (1 children)

That's because you're using it for a purpose it wasn't intended. I2P isn't designed to be used to browse the regular internet, for that it's better to use TOR. However for anonymous torrenting or accessing i2p-sites, it's quite fast imho.

[–] [email protected] 2 points 2 months ago (3 children)

Is it much slower though? I know it was, but is it still true? I get decent speeds on my torrents.

 

cross-posted from: https://lemmy.world/post/17746311

This release, I2P 2.6.0, continues our work by fixing bugs, adding features, and improving the network's reliability.

Newer routers will be favored when selecting floodfill routers. I2PSnark received features which improve the performance of PeX(Peer Exchange), in addition to bug fixes. Legacy transport protocols are being removed, simplifying the code in the UDP transports. Locally-hosted destination will be reachable by local clients without requesting their LeaseSet, improving performance and testability. Additional tweaks were made to peer selection strategies.

I2P no longer allows I2P-over-Tor, connections from Tor exit IP addresses are now blocked. We discourage this because it degrades the performance of I2P and uses up the resources of Tor exits for no benefit. If you are a helpful person running both a Tor Exit and I2P we encourage you to continue to do so, using different IP addresses for each. Non-exit relays and Tor clients are unaffected by this and do not need to change anything.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

RELEASE DETAILS Changes

  • Router: Increase minimum version for floodfill routers

  • Router: Disable I2P over Tor

  • Address Book: Cache locally hosted destinations

Bug Fixes

  • I2PSnark: Peer Exchange Tweaks

  • I2PSnark: Bugfixes

  • Router: Peer Selection Tweaks

Other

  • Translation updates
[–] [email protected] 2 points 2 months ago

Drug addicts desperate for money for example.

[–] [email protected] 10 points 2 months ago (1 children)

Thanks for the answer. So, not wealthy at all then. Good to know.

Fun fact, whenever my blood gets used to help someone, I get a text message telling me, and a thanks. Enormously satisfying.

[–] [email protected] 2 points 2 months ago (2 children)

At least that's good. Keeps the wrong people from donating. Thanks for your answer.

[–] [email protected] 20 points 2 months ago (3 children)

Yeah. The motivation was never money. I was just curious since I heard that you got paid in the US. Apparently I was misinformed.

 

I've been a blood donor for most of my adult life, and have donated about 30 liters. Where I'm at you get a token donation and a thanks for donating, but someone mentioned that in the US you get paid quite a lot depending on the quality and the blood type.

I have a fairly uncommon blood type (about 10% of the population) and a blood count of around 150.

So, how wealthy would I have been if I had donated my blood in the US instead?

[–] [email protected] 5 points 3 months ago (4 children)

That's a shame, I still remember mine. Weird how you can remember 7 random digits from 30 years ago...

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago) (1 children)

Isn't this what the new Freenet aims for? A truly decentralized, but not necessarily anonymous, network?

 

There's a file-sharing app using I2P that's been revived. It's currently not under active development, but it is fully functional as-is.

As always, be careful with unknown programs. I take no responsibility for anything related to the program.

The file can be downloaded from within I2P, or here: https://ufile.io/y1uecxev

If you want to know more about I2P technology and anonymous overlay networks, go to https://geti2p.net/en/

 

Another blogpost on i2p and tor. Not bad from what I can tell. The more exposure the better.

 

cross-posted from: https://lemmy.world/post/9756896

This release, I2P 2.4.0, continues our effort to improve the security and stability of the I2P network. It contains significant improvements to the Network Database, an essential structure within the I2P network used for discovering your peers.

The congestion handling changes will improve network stability by giving routers the ability to relieve congested peers by avoiding them. This will help the network limit the effect of tunnel spam. It will also help the network heal during and after DDoS attacks.

The NetDb changes also help secure individual routers and the applications that use them. Routers can now defend against attackers by separating the NetDB into multiple "Sub-DB's" which we use to prevent information leaks between applications and the router. This also improves the information available to Java routers about their NetDB activity and simplifies our support for multihoming applications.

Also included are a number of bug fixes and enhancements across the I2PSnark and SusiMail applications.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

RELEASE DETAILS

Changes

  • i2psnark: Uncomment and fix local torrent file picker
  • NetDB: Lookup handler/throttler fixes
  • Router: Restructure netDb to isolate data received as a client from data received as a router
  • Router: Implement handling and penalties for congestion caps
  • Router: Temporarily ban routers publishing in the future
  • Transports: Disable SSU 1

Bug Fixes

  • Addressbook: Workaround for i2p-projekt.i2p etag bug (Gitlab #454)
  • Console: Clear out "proxy must be running" status after success
  • Console: Don't lose tabs in log messages
  • Console: Fix sidebar not immediately showing results of manual update check
  • Console: Fix visibility of radio/checkboxes (light theme)
  • Console: Prevent overflow of sidebar status
  • Debian: Change JRE dependency order (Gitlab #443, Debian #1024461)
  • i2psnark: Increase comment bucket size to reduce duplicates
  • i2psnark: Prevent start-all from within search results erroring (Gitlab #445)
  • i2ptunnel: Exempt tunnel name from XSS filter (Gitlab #467)
  • i2ptunnel: Fix gzip footer check in GunzipOutputStream (Gitlab #458)
  • i2ptunnel: Remove nonstandard Proxy-Connection headers (Gitlab #452)
  • NTCP2: Fix updating address on transition to firewalled (Gitlab #435)
  • SAM: Fix accept after soft restart (Gitlab #399)
  • SAM: Reset incoming socket if no subsession is matched (Gitlab #456)
  • SSU2: Fix uncaught IAE caused by itags with zero values (Gitlab #415)
  • SSU2: Prevent rare IAE in peer test timer (Gitlab #433)
  • Susimail: Dark theme fixes
  • Susimail: Fix binary content-encoding
  • Susimail: Fix incorrect "previous" icons
  • Susimail: Fix setting encoding for attachments
  • Susimail: Flush output to fix truncated mails
  • Sybil: Don't ban NAT64 addresses
  • Transport: Fix NPE during soft restart (Gitlab #437)
  • UPnP: Fix handing of multiple IGDs
  • UPnP: Fix missing port in Host header causing failures on libupnp-based devices

Other

  • API 0.9.61
  • Translation updates

Full list of fixed bugs


SHA256 Checksums:

d08db62457d4106ca0e36df3487bdf6731cbb81045b824a003cde38c7e1dfa27  i2pinstall_2.4.0_windows.exe
ef5f3d0629fec292aae15d027f1ecb3cc7f2432a99a5f7738803b453eaad9cad  i2pinstall_2.4.0.jar
30ef8afcad0fffafd94d30ac307f86b5a6b318e2c1f44a023005841a1fcd077c  i2psource_2.4.0.tar.bz2
97be217bf07319a50b6496f932700c3f3c0cceeaf1e0643260d38c9e6e139b53  i2pupdate_2.4.0.zip
8f4a17a8cbadb2eabeb527a36389fd266a4bbcfd9d634fa4f20281f48c486e11  i2pupda#**___**
 

This release, I2P 2.4.0, continues our effort to improve the security and stability of the I2P network. It contains significant improvements to the Network Database, an essential structure within the I2P network used for discovering your peers.

The congestion handling changes will improve network stability by giving routers the ability to relieve congested peers by avoiding them. This will help the network limit the effect of tunnel spam. It will also help the network heal during and after DDoS attacks.

The NetDb changes also help secure individual routers and the applications that use them. Routers can now defend against attackers by separating the NetDB into multiple "Sub-DB's" which we use to prevent information leaks between applications and the router. This also improves the information available to Java routers about their NetDB activity and simplifies our support for multihoming applications.

Also included are a number of bug fixes and enhancements across the I2PSnark and SusiMail applications.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

RELEASE DETAILS

Changes

  • i2psnark: Uncomment and fix local torrent file picker
  • NetDB: Lookup handler/throttler fixes
  • Router: Restructure netDb to isolate data received as a client from data received as a router
  • Router: Implement handling and penalties for congestion caps
  • Router: Temporarily ban routers publishing in the future
  • Transports: Disable SSU 1

Bug Fixes

  • Addressbook: Workaround for i2p-projekt.i2p etag bug (Gitlab #454)
  • Console: Clear out "proxy must be running" status after success
  • Console: Don't lose tabs in log messages
  • Console: Fix sidebar not immediately showing results of manual update check
  • Console: Fix visibility of radio/checkboxes (light theme)
  • Console: Prevent overflow of sidebar status
  • Debian: Change JRE dependency order (Gitlab #443, Debian #1024461)
  • i2psnark: Increase comment bucket size to reduce duplicates
  • i2psnark: Prevent start-all from within search results erroring (Gitlab #445)
  • i2ptunnel: Exempt tunnel name from XSS filter (Gitlab #467)
  • i2ptunnel: Fix gzip footer check in GunzipOutputStream (Gitlab #458)
  • i2ptunnel: Remove nonstandard Proxy-Connection headers (Gitlab #452)
  • NTCP2: Fix updating address on transition to firewalled (Gitlab #435)
  • SAM: Fix accept after soft restart (Gitlab #399)
  • SAM: Reset incoming socket if no subsession is matched (Gitlab #456)
  • SSU2: Fix uncaught IAE caused by itags with zero values (Gitlab #415)
  • SSU2: Prevent rare IAE in peer test timer (Gitlab #433)
  • Susimail: Dark theme fixes
  • Susimail: Fix binary content-encoding
  • Susimail: Fix incorrect "previous" icons
  • Susimail: Fix setting encoding for attachments
  • Susimail: Flush output to fix truncated mails
  • Sybil: Don't ban NAT64 addresses
  • Transport: Fix NPE during soft restart (Gitlab #437)
  • UPnP: Fix handing of multiple IGDs
  • UPnP: Fix missing port in Host header causing failures on libupnp-based devices

Other

  • API 0.9.61
  • Translation updates

Full list of fixed bugs


SHA256 Checksums:

d08db62457d4106ca0e36df3487bdf6731cbb81045b824a003cde38c7e1dfa27  i2pinstall_2.4.0_windows.exe
ef5f3d0629fec292aae15d027f1ecb3cc7f2432a99a5f7738803b453eaad9cad  i2pinstall_2.4.0.jar
30ef8afcad0fffafd94d30ac307f86b5a6b318e2c1f44a023005841a1fcd077c  i2psource_2.4.0.tar.bz2
97be217bf07319a50b6496f932700c3f3c0cceeaf1e0643260d38c9e6e139b53  i2pupdate_2.4.0.zip
8f4a17a8cbadb2eabeb527a36389fd266a4bbcfd9d634fa4f20281f48c486e11  i2pupda#**___**
 

I2P+ is an enhanced version of I2P that aims to deliver a superior user experience. Updated themes, easier to understand configuration and diagnostics, and an enhanced feature set make I2P+ a compelling alternative to the official I2P release. Additionally, I2P+ implements improvements to the router's network performance and, for routers that are firewalled, can significantly increase participating traffic and network responsiveness. Is I2P+ compatible with I2P?

The changes relate to user interaction and enhanced presentation of the console and webapps, in addition to network performance improvements, leaving the underyling crypto untouched, so it remains 100% compatible with I2P. On the network, an I2P+ router will identify as a normal I2P router. Updating from I2P to I2P+, or from I2P+ to I2P, is as simple as providing the router with the relevant update file and restarting. Installation

If you're running a manually installed version of I2P (from the Java installer, not the Easy Installer Bundle, nor a Linux repository or .deb file), updating is as simple as dropping the i2pupdate.zip file into your I2P application folder and restarting the router. Note: Do not extract the zip file, simply copy it to the I2P application folder and restart I2P... I2P will extract the zip automatically and update. (Java 1.8 or later required). For information about migrating from a repo or .deb install, visit the I2P+ site linked below.

To enable updates for I2P+, visit the update page at http://127.0.0.1:7657/configupdate and enable unsigned development updates. The default update address will inform you of release updates, or for development updates (aka rolling release), replace the address with: http://skank.i2p/dev/i2pupdate.zip

Note: If you have installed I2P from the Easy Installer Bundle, this will need to be uninstalled first and your configuration directory renamed or deleted - see the included INSTALL.txt file for more info. New in this release (2.4.0+):

  • Complete console and webapp translations for all listed languages
  • Optimized and improved Javascript for both the console and I2PSnark
  • Improved page rendering for console and webapps
  • I2PSnark filter bar rewritten to use search query parameters instead of Javascript
  • Additional "Connected" filter option for I2PSnark
  • Fix lightbox image display feature in I2PSnark
  • Improved rendering times for identicons
  • Reverse the order of in-console wrapper logs to match router logs (newest entry first)
  • Add a magnet column to I2PSnark's main view with a toggle to switch between magnets and links
  • Process tunnel control requests in the Tunnel Manager in situ to avoid a page reload
  • Display page load bar when checking for router updates and display latest update info
  • Indicate on /jobs when table cells are updated
  • Add security and cache-control headers to resources served by I2PTunnel HTTP server when not present
  • Improvements to console and webapp themes
  • Console logging improvements

Note: Update contains a new GeoIP database and full translations for all available languages. More information

  • Please visit: skank.i2p or i2pplus.github.io
  • Changelog: skank.i2p/changelog.html or i2pplus.github.io/changelog.html
  • Source code is available from: gitlab.com/i2pplus/I2P.Plus or git.skank.i2p/i2pplus/I2P.Plus
  • Torrent Pool of the latest releases: tracker2.postman.i2p/index.php?view=TPoolDetail&id=1256
 

Is that a hoppo?

 

If you're on I2P then these could be added to your list of trackers.

http://i32bdpbyflc5l7ibhqmq7f72gglflrd6sgnmlqj6xsdjis5yjuga.b32.i2p/announce

http://4izytry23uiwxs2epg6swoygyi4vvsd4hwvj5u6onodmoh7gfmha.b32.i2p/announce

 

cross-posted from: https://lemmy.world/post/8784338

Copied from an excellent post by sugarw0000kie on that other site. All credit for the guide to them.

Finally messed around with this and didn't see much about it, feel free to remove if breaking any rules

For this to work you'll need prowlarr, qbittorrent, and the other arrs (radarr/sonarr/readarr etc) and of course i2p router. (You could just use prowlarr to simplify searching for things without sonarr/radarr integration, then you’d just need prowlarr/qbittorrent with i2p)

In prowlarr, we need to set up proxy through i2p. So go settings-->general--> click enable proxy

​ This seems to work

enter your hostname (default 127.0.0.1) and port 4444 or whatever you have your http proxy set to in your i2p install. Make sure to set the ignored addresses with .com/.net etc (* denotes wildcard), so it won't request non i2p addresses through the router, otherwise i believe it will try to search any of your other indexers through i2p which is probably not good

Now you should be able to add Postman tracker like any other tracker in prowlarr as long as it's able to use your router as the proxy

​ aughta come up like this

From here you will need to make sure you have qbittorrent working with i2p. There is a guide floating around for this but to add to that you'll want to get the lt20 version, as the other one (i believe the default download) does not yet offer i2p support

In your i2p router you'll want to make sure your SAM bridge is enabled. Then in qbittorrent go preferences-->connection and enable i2p and put in your router with hostname and port 7656 (i believe that's the default correct me if i'm wrong)

it should look like this, if you don't see this option under "Connection" you probly don't have the lt20 version

Biglybt doesn't seem to have integration with the *arrs, but assuming you have qbittorrent setup with i2p from there it's a matter of going into radarr/sonarr and adding it as a download client like normal.

If you've never done this before, in qbittorrent under Web ui enable the web interface, should be able to leave the ip address blank (or otherwise enter how sonarr/radarr would need to access it) and enter an unused port like 6969. Put in login credentials. go to localhost:6969 or w/e you used and check that you can see the web interface from qbittorrent.

what mine looks like

on sonarr/radarr side, go settings-->download client--> and enter the ip address and port you gave it as well as the username/password. Usually helpful to add a category. Hit the test button to ensure it works

meanwhile in the *arrs

(If you just want to use prowlarr w/o sonarr radarr integration to the steps are the same to connect qbittorrent, just done in prowlarr itself. It can be used like a search engine along with all of your clearnet torrent/usenet indexers this way)

Hope this helps!

 

Copied from an excellent post by sugarw0000kie on that other site. All credit for the guide to them.

Finally messed around with this and didn't see much about it, feel free to remove if breaking any rules

For this to work you'll need prowlarr, qbittorrent, and the other arrs (radarr/sonarr/readarr etc) and of course i2p router. (You could just use prowlarr to simplify searching for things without sonarr/radarr integration, then you’d just need prowlarr/qbittorrent with i2p)

In prowlarr, we need to set up proxy through i2p. So go settings-->general--> click enable proxy

​ This seems to work

enter your hostname (default 127.0.0.1) and port 4444 or whatever you have your http proxy set to in your i2p install. Make sure to set the ignored addresses with .com/.net etc (* denotes wildcard), so it won't request non i2p addresses through the router, otherwise i believe it will try to search any of your other indexers through i2p which is probably not good

Now you should be able to add Postman tracker like any other tracker in prowlarr as long as it's able to use your router as the proxy

​ aughta come up like this

From here you will need to make sure you have qbittorrent working with i2p. There is a guide floating around for this but to add to that you'll want to get the lt20 version, as the other one (i believe the default download) does not yet offer i2p support

In your i2p router you'll want to make sure your SAM bridge is enabled. Then in qbittorrent go preferences-->connection and enable i2p and put in your router with hostname and port 7656 (i believe that's the default correct me if i'm wrong)

it should look like this, if you don't see this option under "Connection" you probly don't have the lt20 version

Biglybt doesn't seem to have integration with the *arrs, but assuming you have qbittorrent setup with i2p from there it's a matter of going into radarr/sonarr and adding it as a download client like normal.

If you've never done this before, in qbittorrent under Web ui enable the web interface, should be able to leave the ip address blank (or otherwise enter how sonarr/radarr would need to access it) and enter an unused port like 6969. Put in login credentials. go to localhost:6969 or w/e you used and check that you can see the web interface from qbittorrent.

what mine looks like

on sonarr/radarr side, go settings-->download client--> and enter the ip address and port you gave it as well as the username/password. Usually helpful to add a category. Hit the test button to ensure it works

meanwhile in the *arrs

(If you just want to use prowlarr w/o sonarr radarr integration to the steps are the same to connect qbittorrent, just done in prowlarr itself. It can be used like a search engine along with all of your clearnet torrent/usenet indexers this way)

Hope this helps!

view more: next ›