How I Run Darknets From My Home Internet (Feds are SEETHING)

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 ธ.ค. 2021
  • In this video I show you how I run different darknets (tor and i2p) from my home network.
    geti2p.net/en/comparison/tor
    github.com/PurpleI2P/i2pd
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
    Dash
    Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
    Zcash
    t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
    Chainlink
    0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
    Bitcoin Cash
    qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
    Etherum Classic
    0xeA641e59913960f578ad39A6B4d02051A5556BfC
    USD Coin
    0x0B045f743A693b225630862a3464B52fefE79FdB
    Subscribe to my TH-cam channel goo.gl/9U10Wz
    and be sure to click that notification bell so you know when new videos are released.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 345

  • @winterland3253
    @winterland3253 2 ปีที่แล้ว +2510

    mental outlaw has been providing such solid tutorials lately that I'm beginning to suspect he's a fed honeypot

    • @No-uc6fg
      @No-uc6fg 2 ปีที่แล้ว +618

      What if the real honeypot were the friends we made along the way?

    • @nkonkonko
      @nkonkonko 2 ปีที่แล้ว +183

      this is the hot fed they warned us about

    • @paulspl2581
      @paulspl2581 2 ปีที่แล้ว +102

      That's why the videos of his face all look fake. They're all AI generated

    • @jamess1787
      @jamess1787 2 ปีที่แล้ว +80

      Fed 100%.
      But a really cool glasses-wearing Chad. 🕶️🤳

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +100

      I agree. 100% Fed.

  •  2 ปีที่แล้ว +127

    Didn't expect to be peer pressured into running a tor node

  • @aetheralmeowstic2392
    @aetheralmeowstic2392 2 ปีที่แล้ว +110

    You know what, the P2P online functionality of my planned Pokémon fan games will be run through I2P.

    • @eillee8394
      @eillee8394 3 หลายเดือนก่อน

      Where is it!!!

  • @idklol4197
    @idklol4197 2 ปีที่แล้ว +751

    the virgin mental outlaw: i have darknets running on my own private server, my pc has custom coded lynooks kernel, and im behind 300 proxies.
    the chad CIA: haha how do i open pdf

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +97

      😆

    • @purplep3466
      @purplep3466 2 ปีที่แล้ว +24

      pin this comment, mr. Virgin Mental Outlaw

    • @spark198rus
      @spark198rus 2 ปีที่แล้ว +19

      Lynooks LOL

    • @iselink
      @iselink 2 ปีที่แล้ว +9

      Actualy this maybe is true as a lot of peoples don't know how to do basic tasks.

    • @cia3653
      @cia3653 2 ปีที่แล้ว +28

      accurate

  • @nnaaaaaa
    @nnaaaaaa 2 ปีที่แล้ว +261

    i2p is stored in the balls.

    • @StefanReich
      @StefanReich 2 ปีที่แล้ว +26

      i2p in the morning. u2?

    • @lorenzo42p
      @lorenzo42p 2 ปีที่แล้ว +8

      I2p in the corner

    • @saltythugproductions9686
      @saltythugproductions9686 ปีที่แล้ว +3

      @@lorenzo42p i2p cocaine to my door

    • @jfrost4998
      @jfrost4998 ปีที่แล้ว +1

      @@saltythugproductions9686can you show me how

    • @jfrost4998
      @jfrost4998 ปีที่แล้ว

      @@saltythugproductions9686legit links

  • @hughjanus8003
    @hughjanus8003 2 ปีที่แล้ว +281

    I love how a gentoo user says “arch btw” when using arch, but just seems to consider gentoo a normal thing

    • @gideonfelt2819
      @gideonfelt2819 2 ปีที่แล้ว +21

      Did you know ChromeOS is Gentoo based too? Just an interesting fact.

    • @hughjanus8003
      @hughjanus8003 2 ปีที่แล้ว +1

      @@gideonfelt2819 why?

    • @marcopeterson805
      @marcopeterson805 2 ปีที่แล้ว +53

      @@hughjanus8003 gentoo is based

    • @totallynotbluu
      @totallynotbluu 2 ปีที่แล้ว +1

      @@hughjanus8003 cause why not

    • @hughjanus8003
      @hughjanus8003 2 ปีที่แล้ว +3

      @@totallynotbluu i meant it like why would gentoo be a better option for chrome os than other distros lmao

  • @FoxMaccloud
    @FoxMaccloud 2 ปีที่แล้ว +55

    Litterly just finished setting up a new tor relay on an old desktop from 2008 that I saved from the landfills xD

  • @nkonkonko
    @nkonkonko 2 ปีที่แล้ว +24

    DAD it's 4 in the morning and i'm here, ready lmfao

    • @nkonkonko
      @nkonkonko 2 ปีที่แล้ว

      6:02 btfo

  • @RmFrZQ
    @RmFrZQ 2 ปีที่แล้ว +88

    Now that TOR network is blocked in Russia by government, I2P network and self-hosted VPN service on VPS are the only options to fight against censorship.

    • @ZVLIAN
      @ZVLIAN 2 ปีที่แล้ว +19

      Oh shit, Isnt russia like THE place for torrents, piracy and stuff?

    • @RmFrZQ
      @RmFrZQ 2 ปีที่แล้ว +23

      @@ZVLIAN Well, yes and no. The famous and reputable torrent trackers were blocked by ISPs a few years ago, but just recently TOR networks were also blocked, because they were commonly used by people to fight against censorship enforcement and government surveillance. The torrent trackers are not going anywhere AFAIK for the rest of the world. TOR blockade just made more difficult to access them from Russia.

    • @nathanl2966
      @nathanl2966 2 ปีที่แล้ว +5

      Don't forget IPFS.

    • @0xva
      @0xva 2 ปีที่แล้ว +9

      Wouldn't tor bridges help with that?

    • @RmFrZQ
      @RmFrZQ 2 ปีที่แล้ว +4

      @@SkyenNovaA yes, bridges work until they become individually blocked by ISPs. The process to get new bridges IPs is complicated, when you don't have access to Tor project website via "clear net".

  • @Dobrouh
    @Dobrouh 2 ปีที่แล้ว +10

    Kudos for the subtle "BTW I use Arch" that you snuck in there

  • @OGPimpin
    @OGPimpin 2 ปีที่แล้ว +79

    Dude, you are a life saver. Ive been wanting to connect to i2pd for years, but was a bit skeptical based on how complicated it could get to set it up. Now its time to take care of business

    • @cagneybillingsley2165
      @cagneybillingsley2165 5 หลายเดือนก่อน

      feds don't care because you're not doing anything that's really illegal or disruptive. they only care if there is physical tangible consequences to their monopolies on force, ideas, money, etc. ideas on the darknet are easily counteracted with tons of media propaganda

  • @MrCrabs231
    @MrCrabs231 2 ปีที่แล้ว +25

    "It's the deep web so you know that lain is gonna be posted everywhere"

  • @c4llv07e
    @c4llv07e 2 ปีที่แล้ว +9

    Yay! MO is talking about i2p and i2pd in general!

  • @ranaakhil
    @ranaakhil 2 ปีที่แล้ว +55

    Thanks for the incredible guide.
    But thing about running relays at home is most ISPs now a days provide dynamic IPs which are behind Carrier Grade NATs and they don't allow port forwarding. :(

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 ปีที่แล้ว +9

      True, but you can ask. Say that you are playing a new game and want to create a server and need port 4444 or whatever

    • @matthewsoules7064
      @matthewsoules7064 ปีที่แล้ว +6

      Say you wanna play a RuneScape private server...sounds cheesy as fuck but that's a very popular thing

  • @LeDechaine
    @LeDechaine 2 ปีที่แล้ว +37

    Thanks for this, I went from 26% ram use to 2.6% ram use by switching to i2pd!
    Also did not know about ssh tunneling, really helpful.

  • @gideonfelt2819
    @gideonfelt2819 2 ปีที่แล้ว +6

    This is awesome, wish it grows to tor level popularity.

  • @Zerao98
    @Zerao98 2 ปีที่แล้ว +128

    Correct me if I'm wrong but upnp can be a security vulnerability, why would you enable it? upnp should be off (already at the router).

    • @MentalOutlaw
      @MentalOutlaw  2 ปีที่แล้ว +72

      afaik there were some insecure implementations of it on older router firmware, it would also make it easier for malware to spread to other devices if one becomes compromised.

    • @Zerao98
      @Zerao98 2 ปีที่แล้ว +28

      @@MentalOutlaw
      Seems like something you wanna have off if you're going for security. I found this in one source (upguard), it says:
      To prevent such infectious connections from occurring, the entire attack surface associated with a UPnP connection must be kept updated with the latest patches. This includes routers, firewalls, antivirus software, and all IoT devices that are to be connected.

    • @surewhynot6259
      @surewhynot6259 2 ปีที่แล้ว

      @@Zerao98 it's only a concern if unsecure programs open ports on it

    • @Zerao98
      @Zerao98 2 ปีที่แล้ว +11

      @@surewhynot6259 someone might have a school or work laptop on the network, or just litterally any guest with wifi access. Any of those could lead a problem. There's literally no reason to enable upnp, if you go all the way tor/i2p kind of thing.

    • @w1z4rd9
      @w1z4rd9 2 ปีที่แล้ว +1

      @@Zerao98 Oh that one where the Russians made the FBI warn the people of it.

  • @TheBenSanders
    @TheBenSanders ปีที่แล้ว

    lmao switching to the terminal tab with the neofetch pulled up was really funny.

  • @DoingFedTime
    @DoingFedTime ปีที่แล้ว +7

    As someone who was a darknet admin, vendor, and buyer - then fought the feds in court. The feds don't care it's a job for them.

  • @crepituss9381
    @crepituss9381 2 ปีที่แล้ว +2

    I haven't used lynx for at least 15 years. Glad it's still around.

  • @fatguybob2778
    @fatguybob2778 2 ปีที่แล้ว +6

    Started college for Cybersecurity this year and I absolutely love this community! Woohoo info sec 4 life

  • @taiwan8741
    @taiwan8741 2 ปีที่แล้ว +2

    I got a US marine corps ad before this video started.

  • @krypek940
    @krypek940 2 ปีที่แล้ว

    best tech chanel + love your voice

  • @xcat4775
    @xcat4775 2 ปีที่แล้ว +1

    yikes ssh makes me nervous. Been thinking about running i2P lately though. Good to hear about it

  • @SacGeoTV
    @SacGeoTV 2 ปีที่แล้ว +25

    Gods Bless You - give em HELL 👹

  • @0x007A
    @0x007A 2 ปีที่แล้ว

    To improve online safety from surveillance setup your own VPN service on a VPS, from there connect to another VPS hosting your I2P node and/or Tor middle or exit node.

  • @Anthony-cn8ll
    @Anthony-cn8ll 2 ปีที่แล้ว +9

    The biggest thing that prevents hosting from home is assymetric speeds where you might get 1000 Mbps down but only 40 Mbps up. If you want any more then it has to be a prohibitively expensive business account. i2p is great because of the P2P structure, so hosting isn't as painful.

    • @dalethomasdewitt
      @dalethomasdewitt 2 ปีที่แล้ว

      Advanced smrs were retrofitted to all metropolitan areas. Industry prospered: extreme bandwidth for cheap became the norm. AI controlled businesses allowed a new form of democracy. A bitcoin inexpensively powered ..
      .. allowed only the great things about nation states to replicate amounst the human civilization.

  • @georgecaveington1661
    @georgecaveington1661 2 ปีที่แล้ว +13

    It's safe to SSH tunnel over the internet because SSH is encrypted so the tunneled traffic will also be encrypted.

    • @curlybeckster288
      @curlybeckster288 2 ปีที่แล้ว +7

      Yeah, this is what I was thinking. As long as I2P is configured to not allow connections to its web console using its public ip addresses, then it should be fine.

  • @metie10
    @metie10 2 ปีที่แล้ว +4

    yo mental outlaw, can you make an indepth video about hosting a very safe and anonymous tor website. great vids

  • @electricz3045
    @electricz3045 2 ปีที่แล้ว +6

    "i use arch btw" 🤣

  • @xtremememestv1717
    @xtremememestv1717 8 หลายเดือนก่อน

    ur my hero bro

  • @Cookiekeks
    @Cookiekeks 2 ปีที่แล้ว +2

    Can you please make a video about the Lokinet? It's another onion routing network, made by the devs of Session (private messenger).

  • @wmdtone
    @wmdtone 2 ปีที่แล้ว

    Very cool vid, thanks

  • @24680kong
    @24680kong 2 ปีที่แล้ว +1

    Thank you Based IT Guy.

  • @bin4rym4ge
    @bin4rym4ge ปีที่แล้ว +1

    Almost can't believe this actually works. Never knew you could port forward through ssh like that, super fun.
    God bless.

  • @MageAtYou
    @MageAtYou 9 หลายเดือนก่อน

    How would you go on about setting up guerilla darknet exit route? Im thinking raspberry pi connected hidden somewhere connected to power and a local wifi. Thats the stuff tor needs!

  • @potentwater2260
    @potentwater2260 2 ปีที่แล้ว +3

    Don’t understand anything, but enjoy the good content.

  • @ebfromtha410
    @ebfromtha410 2 ปีที่แล้ว +2

    Gotta love that pc name

  • @matthewgoodwin8206
    @matthewgoodwin8206 2 ปีที่แล้ว +17

    Noob question: if in the Tor network each node is responsible for encrypting and decrypting the same layer of protection then that should mean that each decryption key is stored offline and only useable by the node responsible for that layer. However in the i2p network different servers are responsible for encryption and decryption. Does that mean that the encryption key has to be sent across the web to another server? This seems like a security vulnerability.

    • @radman4049
      @radman4049 9 หลายเดือนก่อน +2

      Tor Network:
      In the Tor network, the traffic between nodes is encrypted in multiple layers (onion layers), and each node in the chain only decrypts one layer, revealing the next node's identity to which the traffic should be sent. This allows each node to only know about its immediate predecessor and successor, enhancing privacy. Each node is aware only of its part in the route, which is determined by the circuit established when the user connects to the network.
      I2P Network:
      In the I2P network, the routing is done differently. Instead of the onion routing used in Tor, I2P uses a "garlic routing" scheme. In garlic routing, messages are bundled together in garlic cloves, each with its own encryption layer. Each node removes one layer of encryption and then forwards the remaining clove to the next node. Unlike Tor, where each node knows only about its predecessor and successor, I2P nodes have knowledge of the entire route, making it different in terms of anonymity characteristics.
      In the case of I2P, because each node knows the entire route, it's true that the encryption key has to be sent across the network. However, the encryption keys are encrypted themselves, and multiple layers of encryption provide security. The nodes are trusted to properly forward the encrypted data without revealing the content.
      While the differences in encryption and routing between Tor and I2P have led to various discussions regarding their security properties, it's important to note that both networks have their own design philosophies and trade-offs. Both networks strive to provide anonymity and privacy for users, but their approaches and security models are distinct.
      Security vulnerabilities can exist in any system, and network design choices can impact the potential attack vectors. It's crucial for the developers of these networks to carefully consider security implications and continually improve their protocols based on the latest research and understanding of potential risks.

  • @CaptZenPetabyte
    @CaptZenPetabyte 2 ปีที่แล้ว +8

    If there were a way to make Tor exit nodes 'safer' then I am sure we could all just shove a docker container up, same for I2P... maybe that is the solution, so that if someone comes to mash it down a container would be easier to 'self destruct' and defunct the node?

    • @salpertia
      @salpertia 7 หลายเดือนก่อน

      I know that the container exists but you look stupid deleting it only for them to know it came from your address.
      Not to mention your TH-cam watch history confirms you are tech literate

  • @sillysausage231
    @sillysausage231 2 ปีที่แล้ว

    I hecking love watching this with exactly zero idea what the fuck is going on :)

  • @foxtailedcritter
    @foxtailedcritter 2 ปีที่แล้ว +1

    Just like McDonald's I'm Lovin' this.

  • @DiegoLinde
    @DiegoLinde 2 ปีที่แล้ว +3

    Can you cover Lokinet, please?

  • @qm3ster
    @qm3ster 2 ปีที่แล้ว +1

    Is it really not possible to persist I2P state over a reboot?
    What about internet dropping out?

  • @pucktoad
    @pucktoad 2 ปีที่แล้ว +1

    Have you considered a video on zeronet?

  • @NModem
    @NModem 2 ปีที่แล้ว

    I got recommended this but don't know what it is, did a quick read, is it like seeding but for the Tor network?

  • @egg5474
    @egg5474 2 ปีที่แล้ว

    Chief, do you mind telling me what you’re doing on board that Onion?

  • @chubbycatfish4573
    @chubbycatfish4573 2 ปีที่แล้ว +5

    Kenny is the new Lain.

    • @magnusanderson6681
      @magnusanderson6681 2 ปีที่แล้ว +1

      I need to watch this anime don't I
      It's actually pretty sad I've seen dozens of anime but none of the classics

    • @chubbycatfish4573
      @chubbycatfish4573 2 ปีที่แล้ว +1

      @@magnusanderson6681 You should!

  • @stepannovotny4291
    @stepannovotny4291 9 หลายเดือนก่อน

    The Java client does pass HTTPS but the i2pd not so much! I hope they fix that.

  • @eddiehazard3340
    @eddiehazard3340 2 ปีที่แล้ว +19

    Hi Mental Outlaw, I love your channel. I thought I'd suggest you might want to change the title of this one - if legislation changes and they decide you are doing something illegal, this title could be damning in a later trial. Thanks very much for all the info you give us. I gave you a thumbs-up/like !

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 ปีที่แล้ว +18

      BS. The date is previous to the supposed future law and it doesn't work retroactively to punish.

    • @eddiehazard3340
      @eddiehazard3340 2 ปีที่แล้ว +16

      @@cleitonfelipe2092 You're insane. They look at peoples social media all the time to prove "intent". You're simply wrong.

    • @joeh6346
      @joeh6346 2 ปีที่แล้ว +3

      ​@@eddiehazard3340 This needs to be decided, both comments have the same likes and I want to know what is the correct thinking here.

    • @FirstLast-fl7mo
      @FirstLast-fl7mo 2 ปีที่แล้ว +1

      @@joeh6346 Social media aswell as local files will provide a very good insight into the mind of someone.

    • @Angel-yp6nl
      @Angel-yp6nl ปีที่แล้ว

      @@eddiehazard3340 with enough money, you can do anything

  • @barrdack
    @barrdack 2 ปีที่แล้ว +8

    This channel is a honey pot :D

  • @triularity
    @triularity ปีที่แล้ว +1

    I'm not sure why ssh forwarding a port over the internet would be an issue. It's no less secure than ssh-ing into a server shell over the internet. Everything is [suppose to be] encrypted. 🤔

  • @ejonesss
    @ejonesss 2 ปีที่แล้ว +9

    how safe are we on i2p since you act like a torrent and you become (possibly an exit node) from the feds?
    can the feds get you on the activity to certain web sites that are requested based on the urls despite the content being encrypted
    how good is your plausible deniability? (oh i dont know anything about the sites that you claim i am accessing)
    at least with tor you are NOT handling others traffic because by default the relaying and exit node is disabled so you should be safer on tor when visiting safer sites

    • @alejandro_5271
      @alejandro_5271 หลายเดือนก่อน

      The FEDs and the Government already know about this stuff, it's the common folk (who intrude into your privacy) that you need to guard against.

  • @mskiptr
    @mskiptr 2 ปีที่แล้ว +19

    Why would tunneling some port over SSH be unsafe? I mean the point of these tunnels is to make it safe, isn't it?

    • @Zaptosis
      @Zaptosis 2 ปีที่แล้ว +1

      ip

    • @hanelyp1
      @hanelyp1 2 ปีที่แล้ว +5

      It would not be the ssh part that's a problem, but exposing the port to someplace it was not otherwise accessible.

    • @mskiptr
      @mskiptr 2 ปีที่แล้ว +5

      @@hanelyp1 But the forwarded port is accessible only on the loopback interface

  • @AJKvideoproductions
    @AJKvideoproductions 2 ปีที่แล้ว

    Super useful video

  • @bubbleboy821
    @bubbleboy821 2 ปีที่แล้ว +1

    Cover lokinet I can't believe you haven't done a video on it yet

  • @TheCrowSpy
    @TheCrowSpy 2 ปีที่แล้ว +9

    If I2P sends client functions also (kinda) as a router, wuoldn't it be easy to sinff relayed data?

    • @c4llv07e
      @c4llv07e 2 ปีที่แล้ว +7

      It's complicated, but no. i2p was created with the idea that all transition nodes are compromised.

  • @donnadie2068
    @donnadie2068 2 ปีที่แล้ว

    What do you think about Zeronet?

  • @kay_Z420
    @kay_Z420 8 หลายเดือนก่อน

    Any good advice in creting a site eg. The html layout and where to go to get captchas set up

    • @sassycat77
      @sassycat77 8 หลายเดือนก่อน

      Info like that is on google

  • @electricman1884
    @electricman1884 2 ปีที่แล้ว

    Is there any possibility to set up tor relay or i2p if i have router with mobile data without using vpn ?

  • @donniedarko6432
    @donniedarko6432 ปีที่แล้ว

    can i use i2p on tails? and if yes how can i install the programm on the persistent volume?

  • @guiAI
    @guiAI 2 ปีที่แล้ว

    Why should i do this? Is there any benefit for me other than improving the network?

  • @nathanfitzpatrick3152
    @nathanfitzpatrick3152 2 ปีที่แล้ว

    can you run i2p on an openwrt or tomato router?

  • @VivekYadav-ds8oz
    @VivekYadav-ds8oz 2 ปีที่แล้ว +4

    Can anybody please explain why we don't have arbitrary no. of user-chosen proxies in either Tor or I2P? If we didn't select nodes as belonging to one of the three layers, but just general proxies, we can implement this. What's the programmatic/algorithmic/design difficulties that prevent this from being done?

    • @LiberOpine
      @LiberOpine 2 ปีที่แล้ว

      I don’t think it’s possible to do without the nodes you are connecting to knowing how many relays deep you are which can be used to differentiate you from other users. In a predefined number of nodes, the first node knows that it will always send your data to an arbitrarily chosen second node and vice versa.

  • @mushenji
    @mushenji 2 ปีที่แล้ว +14

    Next; talk about distributed web 3. I already set up my tor middle node on a VPS. Next is to set up I2P.

  • @Bhatakti_Hawas
    @Bhatakti_Hawas 2 ปีที่แล้ว +6

    Plot Twist : Mental Outlaw works in the CIA

  • @All3me1
    @All3me1 ปีที่แล้ว

    I did change that rule in the config but it stills says firewalled
    Should I change something in the router settings?

  • @jonathanrealman8415
    @jonathanrealman8415 2 ปีที่แล้ว

    I own a pfsense firewall, could I technically run the I2P router on that firewall?

  • @johannordstrom1932
    @johannordstrom1932 2 ปีที่แล้ว

    GTFOGlowie is GOAT hostname

  • @noanyobiseniss7462
    @noanyobiseniss7462 2 ปีที่แล้ว +1

    Bout time you got there.

  • @astlari
    @astlari 2 ปีที่แล้ว

    thanks

  • @Flat_Erik
    @Flat_Erik 2 ปีที่แล้ว

    you should have shown us the chan-memorial i2p xD... im pretty sure that there's only youtube friendly content on it

  • @RusherDevelopment
    @RusherDevelopment 2 ปีที่แล้ว

    Epic

  • @lorenzo42p
    @lorenzo42p 2 ปีที่แล้ว

    if you need a port forward, then set up a proper port forward in your router. I would never enable upnp

  • @greob
    @greob 2 ปีที่แล้ว +6

    The Java implementation of i2p has a builtin torrent client, and some other neat stuffs (graphs, email client, etc.)

    • @thegrandnil764
      @thegrandnil764 2 ปีที่แล้ว +25

      > java
      > builtin bloat
      why am i superized

    • @czumpi
      @czumpi 2 ปีที่แล้ว +1

      cool

  • @im1random263
    @im1random263 2 ปีที่แล้ว

    Why use a ssh tunnel instead of just connecting to the local ip address of the pi?

  • @Ultrajamz
    @Ultrajamz 2 ปีที่แล้ว +3

    I feel like soon either via new law or new interpretation of the law, they will make this a crime

  • @AndrewWilson1991
    @AndrewWilson1991 2 ปีที่แล้ว

    i can see the glow from here

  • @C1rnobyl
    @C1rnobyl หลายเดือนก่อน

    Most people can't run a good Tor relay or I2P router at home unless they have fiber to the premises Internet. Upload bandwidth is a big issue.

  • @destroyer2973
    @destroyer2973 ปีที่แล้ว

    You should check out freenet btw.

  • @isbestlizard
    @isbestlizard 2 ปีที่แล้ว

    I don't agree with your comment that you don't need to worry about https because i2p encrypts. Surely using http means that the site you're browsing, and any data you get/post to it, is sent in the clear over the internet and can be slurped up. Enforcing https means that only the destination web server can see that data, and hopefully (assuming they've not jumped into bed with the NSA) remains private.

  • @tedbybolf4616
    @tedbybolf4616 2 ปีที่แล้ว +2

    Coreboot your thinkpad for more security.

  • @olokelo
    @olokelo 2 ปีที่แล้ว

    Does anyone know what kind of network traffic speed should I be able to achieve as a i2p router?

  • @semioval
    @semioval 2 ปีที่แล้ว +15

    WHAT THE FUCK IS KERNEL AND HOW DO I UNINSTALL IT?!

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +4

      There is a system32 folder on your computer
      Just leave it where it is.

    • @smayansahu1070
      @smayansahu1070 2 ปีที่แล้ว +3

      sudo pacman -R linux

  • @FloFaber
    @FloFaber 2 ปีที่แล้ว

    Why would you not tunnel certain ports over SSH? Nobody will see what's going thru the ssh tunnel anyway.

  • @alice20001
    @alice20001 2 ปีที่แล้ว +1

    @9:07 Omg, did you just full screen a browser?

  • @nightking1863
    @nightking1863 2 ปีที่แล้ว

    Please make a video on how to host a website on tor

  • @hammerheadcorvette4
    @hammerheadcorvette4 2 ปีที่แล้ว

    What's the name of the famous Book Club on the onion ?

  • @pushkalsingh5603
    @pushkalsingh5603 2 ปีที่แล้ว

    I AM HAVING DIFFICULTIES CONFIGURING I2P WITH MY TOR BROWSER ANY DETAILED GUID TO HELP OUT WITH THIS????

  • @enochrockwell7202
    @enochrockwell7202 2 ปีที่แล้ว

    For some reason i'm reminded of when zeronet was a thing

  • @DrunkynMonkee
    @DrunkynMonkee 2 ปีที่แล้ว

    TOR was created by United States Naval Research Laboratory employees and the NSA. JS

  • @sirlimen333
    @sirlimen333 2 ปีที่แล้ว +17

    So this how discord mods get their "special" material.

    • @Angel-yp6nl
      @Angel-yp6nl ปีที่แล้ว

      Went over a lot of people's heads lmao

  • @askingwithai
    @askingwithai ปีที่แล้ว

    Can invest on i2p

  • @generalralph6291
    @generalralph6291 ปีที่แล้ว +1

    Of course Lain is the mascot of the dark web! It’s obligatory!

  • @pugnace9169
    @pugnace9169 2 ปีที่แล้ว +2

    bro lokinet bro lokinet man

  • @NeverSaid-
    @NeverSaid- 2 ปีที่แล้ว +5

    Someone should really be replicating some defi programs for the dark webs. Tor, i2p, freenet. Thats the only way to bypass KYC and access these programs long term. Crypto needs to go back to its roots.

  • @polyesterbebe
    @polyesterbebe 2 ปีที่แล้ว +1

    for the algorithm

  • @l_s2701
    @l_s2701 2 ปีที่แล้ว +4

    Alright alright what's your iFunny

  • @BallsDeep-ze2nt
    @BallsDeep-ze2nt 2 ปีที่แล้ว +4

    Russian government yeeted all public relays into oblivion. Obfs4 bridges still run nicely here.

  • @battokizu
    @battokizu 2 ปีที่แล้ว

    i2p chads rise up