How I Run Darknets From My Home Internet (Feds are SEETHING)

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 พ.ย. 2024

ความคิดเห็น • 358

  • @winterland3253
    @winterland3253 2 ปีที่แล้ว +2586

    mental outlaw has been providing such solid tutorials lately that I'm beginning to suspect he's a fed honeypot

    • @No-uc6fg
      @No-uc6fg 2 ปีที่แล้ว +632

      What if the real honeypot were the friends we made along the way?

    • @nkonkonko
      @nkonkonko 2 ปีที่แล้ว +184

      this is the hot fed they warned us about

    • @paulspl2581
      @paulspl2581 2 ปีที่แล้ว +100

      That's why the videos of his face all look fake. They're all AI generated

    • @jamess1787
      @jamess1787 2 ปีที่แล้ว +80

      Fed 100%.
      But a really cool glasses-wearing Chad. 🕶️🤳

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +102

      I agree. 100% Fed.

  •  2 ปีที่แล้ว +162

    Didn't expect to be peer pressured into running a tor node

  • @OGPimpin
    @OGPimpin 2 ปีที่แล้ว +84

    Dude, you are a life saver. Ive been wanting to connect to i2pd for years, but was a bit skeptical based on how complicated it could get to set it up. Now its time to take care of business

    • @cagneybillingsley2165
      @cagneybillingsley2165 11 หลายเดือนก่อน

      feds don't care because you're not doing anything that's really illegal or disruptive. they only care if there is physical tangible consequences to their monopolies on force, ideas, money, etc. ideas on the darknet are easily counteracted with tons of media propaganda

  • @aetheralmeowstic2392
    @aetheralmeowstic2392 2 ปีที่แล้ว +128

    You know what, the P2P online functionality of my planned Pokémon fan games will be run through I2P.

    • @eillee8394
      @eillee8394 9 หลายเดือนก่อน +3

      Where is it!!!

    • @destroyer2973
      @destroyer2973 3 หลายเดือนก่อน +2

      Gotta keep Nintendo lawyers at bay.

  • @Dobrouh
    @Dobrouh 2 ปีที่แล้ว +18

    Kudos for the subtle "BTW I use Arch" that you snuck in there

  • @idklol4197
    @idklol4197 2 ปีที่แล้ว +774

    the virgin mental outlaw: i have darknets running on my own private server, my pc has custom coded lynooks kernel, and im behind 300 proxies.
    the chad CIA: haha how do i open pdf

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +97

      😆

    • @purplep3466
      @purplep3466 2 ปีที่แล้ว +25

      pin this comment, mr. Virgin Mental Outlaw

    • @spark198rus
      @spark198rus 2 ปีที่แล้ว +19

      Lynooks LOL

    • @iselink
      @iselink 2 ปีที่แล้ว +8

      Actualy this maybe is true as a lot of peoples don't know how to do basic tasks.

    • @cia3653
      @cia3653 2 ปีที่แล้ว +29

      accurate

  • @nnaaaaaa
    @nnaaaaaa 2 ปีที่แล้ว +280

    i2p is stored in the balls.

    • @StefanReich
      @StefanReich 2 ปีที่แล้ว +26

      i2p in the morning. u2?

    • @lorenzo42p
      @lorenzo42p 2 ปีที่แล้ว +9

      I2p in the corner

    • @saltythugproductions9686
      @saltythugproductions9686 ปีที่แล้ว +4

      @@lorenzo42p i2p cocaine to my door

    • @jfrost4998
      @jfrost4998 ปีที่แล้ว +2

      @@saltythugproductions9686can you show me how

    • @jfrost4998
      @jfrost4998 ปีที่แล้ว

      @@saltythugproductions9686legit links

  • @FoxMaccloud
    @FoxMaccloud 2 ปีที่แล้ว +61

    Litterly just finished setting up a new tor relay on an old desktop from 2008 that I saved from the landfills xD

  • @RmFrZQ
    @RmFrZQ 2 ปีที่แล้ว +95

    Now that TOR network is blocked in Russia by government, I2P network and self-hosted VPN service on VPS are the only options to fight against censorship.

    • @ZVLIAN
      @ZVLIAN 2 ปีที่แล้ว +22

      Oh shit, Isnt russia like THE place for torrents, piracy and stuff?

    • @RmFrZQ
      @RmFrZQ 2 ปีที่แล้ว +27

      @@ZVLIAN Well, yes and no. The famous and reputable torrent trackers were blocked by ISPs a few years ago, but just recently TOR networks were also blocked, because they were commonly used by people to fight against censorship enforcement and government surveillance. The torrent trackers are not going anywhere AFAIK for the rest of the world. TOR blockade just made more difficult to access them from Russia.

    • @nathanl2966
      @nathanl2966 2 ปีที่แล้ว +5

      Don't forget IPFS.

    • @0xva
      @0xva 2 ปีที่แล้ว +10

      Wouldn't tor bridges help with that?

    • @RmFrZQ
      @RmFrZQ 2 ปีที่แล้ว +5

      @@SkyenNovaA yes, bridges work until they become individually blocked by ISPs. The process to get new bridges IPs is complicated, when you don't have access to Tor project website via "clear net".

  • @LeDechaine
    @LeDechaine 2 ปีที่แล้ว +37

    Thanks for this, I went from 26% ram use to 2.6% ram use by switching to i2pd!
    Also did not know about ssh tunneling, really helpful.

  • @hughjanus8003
    @hughjanus8003 2 ปีที่แล้ว +290

    I love how a gentoo user says “arch btw” when using arch, but just seems to consider gentoo a normal thing

    • @gideonfelt2819
      @gideonfelt2819 2 ปีที่แล้ว +21

      Did you know ChromeOS is Gentoo based too? Just an interesting fact.

    • @hughjanus8003
      @hughjanus8003 2 ปีที่แล้ว +1

      @@gideonfelt2819 why?

    • @marcopeterson805
      @marcopeterson805 2 ปีที่แล้ว +55

      @@hughjanus8003 gentoo is based

    • @totallynotbluu
      @totallynotbluu 2 ปีที่แล้ว +1

      @@hughjanus8003 cause why not

    • @hughjanus8003
      @hughjanus8003 2 ปีที่แล้ว +3

      @@totallynotbluu i meant it like why would gentoo be a better option for chrome os than other distros lmao

  • @c4llv07e
    @c4llv07e 2 ปีที่แล้ว +9

    Yay! MO is talking about i2p and i2pd in general!

  • @ranaakhil
    @ranaakhil 2 ปีที่แล้ว +56

    Thanks for the incredible guide.
    But thing about running relays at home is most ISPs now a days provide dynamic IPs which are behind Carrier Grade NATs and they don't allow port forwarding. :(

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 ปีที่แล้ว +11

      True, but you can ask. Say that you are playing a new game and want to create a server and need port 4444 or whatever

    • @matthewsoules7064
      @matthewsoules7064 ปีที่แล้ว +8

      Say you wanna play a RuneScape private server...sounds cheesy as fuck but that's a very popular thing

  • @fatguybob2778
    @fatguybob2778 2 ปีที่แล้ว +7

    Started college for Cybersecurity this year and I absolutely love this community! Woohoo info sec 4 life

  • @nkonkonko
    @nkonkonko 2 ปีที่แล้ว +26

    DAD it's 4 in the morning and i'm here, ready lmfao

    • @nkonkonko
      @nkonkonko 2 ปีที่แล้ว

      6:02 btfo

  • @chrisjones2737
    @chrisjones2737 3 หลายเดือนก่อน

    I just started college for computer science, I’m trying to understand the different buzz words and dark net was one. Good explanation

  • @gideonfelt2819
    @gideonfelt2819 2 ปีที่แล้ว +7

    This is awesome, wish it grows to tor level popularity.

  • @Sam_Bent
    @Sam_Bent ปีที่แล้ว +8

    As someone who was a darknet admin, vendor, and buyer - then fought the feds in court. The feds don't care it's a job for them.

  • @MrCrabs231
    @MrCrabs231 2 ปีที่แล้ว +27

    "It's the deep web so you know that lain is gonna be posted everywhere"

  • @Anthony-cn8ll
    @Anthony-cn8ll 2 ปีที่แล้ว +9

    The biggest thing that prevents hosting from home is assymetric speeds where you might get 1000 Mbps down but only 40 Mbps up. If you want any more then it has to be a prohibitively expensive business account. i2p is great because of the P2P structure, so hosting isn't as painful.

    • @dalethomasdewitt
      @dalethomasdewitt 2 ปีที่แล้ว

      Advanced smrs were retrofitted to all metropolitan areas. Industry prospered: extreme bandwidth for cheap became the norm. AI controlled businesses allowed a new form of democracy. A bitcoin inexpensively powered ..
      .. allowed only the great things about nation states to replicate amounst the human civilization.

  • @crepituss9381
    @crepituss9381 2 ปีที่แล้ว +2

    I haven't used lynx for at least 15 years. Glad it's still around.

  • @Zerao98
    @Zerao98 2 ปีที่แล้ว +128

    Correct me if I'm wrong but upnp can be a security vulnerability, why would you enable it? upnp should be off (already at the router).

    • @MentalOutlaw
      @MentalOutlaw  2 ปีที่แล้ว +73

      afaik there were some insecure implementations of it on older router firmware, it would also make it easier for malware to spread to other devices if one becomes compromised.

    • @Zerao98
      @Zerao98 2 ปีที่แล้ว +27

      @@MentalOutlaw
      Seems like something you wanna have off if you're going for security. I found this in one source (upguard), it says:
      To prevent such infectious connections from occurring, the entire attack surface associated with a UPnP connection must be kept updated with the latest patches. This includes routers, firewalls, antivirus software, and all IoT devices that are to be connected.

    • @surewhynot6259
      @surewhynot6259 2 ปีที่แล้ว

      @@Zerao98 it's only a concern if unsecure programs open ports on it

    • @Zerao98
      @Zerao98 2 ปีที่แล้ว +11

      @@surewhynot6259 someone might have a school or work laptop on the network, or just litterally any guest with wifi access. Any of those could lead a problem. There's literally no reason to enable upnp, if you go all the way tor/i2p kind of thing.

    • @w1z4rd9
      @w1z4rd9 2 ปีที่แล้ว +1

      @@Zerao98 Oh that one where the Russians made the FBI warn the people of it.

  • @wonyoung2523
    @wonyoung2523 2 ปีที่แล้ว +2

    I got a US marine corps ad before this video started.

  • @georgecaveington1661
    @georgecaveington1661 2 ปีที่แล้ว +13

    It's safe to SSH tunnel over the internet because SSH is encrypted so the tunneled traffic will also be encrypted.

    • @curlybeckster288
      @curlybeckster288 2 ปีที่แล้ว +7

      Yeah, this is what I was thinking. As long as I2P is configured to not allow connections to its web console using its public ip addresses, then it should be fine.

  • @eddiehazard3340
    @eddiehazard3340 2 ปีที่แล้ว +19

    Hi Mental Outlaw, I love your channel. I thought I'd suggest you might want to change the title of this one - if legislation changes and they decide you are doing something illegal, this title could be damning in a later trial. Thanks very much for all the info you give us. I gave you a thumbs-up/like !

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 ปีที่แล้ว +18

      BS. The date is previous to the supposed future law and it doesn't work retroactively to punish.

    • @eddiehazard3340
      @eddiehazard3340 2 ปีที่แล้ว +15

      @@cleitonfelipe2092 You're insane. They look at peoples social media all the time to prove "intent". You're simply wrong.

    • @joeh6346
      @joeh6346 2 ปีที่แล้ว +3

      ​@@eddiehazard3340 This needs to be decided, both comments have the same likes and I want to know what is the correct thinking here.

    • @FirstLast-fl7mo
      @FirstLast-fl7mo 2 ปีที่แล้ว +1

      @@joeh6346 Social media aswell as local files will provide a very good insight into the mind of someone.

    • @Angel-yp6nl
      @Angel-yp6nl 2 ปีที่แล้ว

      @@eddiehazard3340 with enough money, you can do anything

  • @potentwater2260
    @potentwater2260 2 ปีที่แล้ว +3

    Don’t understand anything, but enjoy the good content.

  • @TheBenSanders
    @TheBenSanders ปีที่แล้ว

    lmao switching to the terminal tab with the neofetch pulled up was really funny.

  • @blake77777
    @blake77777 7 หลายเดือนก่อน +1

    Dedicating my time and resources to serving up CP and other trash? Solid, based, live saver, helpful, thanks!

  • @CaptZenPetabyte
    @CaptZenPetabyte 2 ปีที่แล้ว +8

    If there were a way to make Tor exit nodes 'safer' then I am sure we could all just shove a docker container up, same for I2P... maybe that is the solution, so that if someone comes to mash it down a container would be easier to 'self destruct' and defunct the node?

    • @salpertia
      @salpertia ปีที่แล้ว

      I know that the container exists but you look stupid deleting it only for them to know it came from your address.
      Not to mention your TH-cam watch history confirms you are tech literate

  • @sdvcs-o2v
    @sdvcs-o2v 5 หลายเดือนก่อน +1

    old classic little project to do after high school

  • @chubbycatfish4573
    @chubbycatfish4573 2 ปีที่แล้ว +5

    Kenny is the new Lain.

    • @magnusanderson6681
      @magnusanderson6681 2 ปีที่แล้ว +1

      I need to watch this anime don't I
      It's actually pretty sad I've seen dozens of anime but none of the classics

    • @chubbycatfish4573
      @chubbycatfish4573 2 ปีที่แล้ว +1

      @@magnusanderson6681 You should!

  • @xcat4775
    @xcat4775 2 ปีที่แล้ว +1

    yikes ssh makes me nervous. Been thinking about running i2P lately though. Good to hear about it

  • @bin4rym4ge
    @bin4rym4ge ปีที่แล้ว +1

    Almost can't believe this actually works. Never knew you could port forward through ssh like that, super fun.
    God bless.

  • @matthewgoodwin8206
    @matthewgoodwin8206 2 ปีที่แล้ว +17

    Noob question: if in the Tor network each node is responsible for encrypting and decrypting the same layer of protection then that should mean that each decryption key is stored offline and only useable by the node responsible for that layer. However in the i2p network different servers are responsible for encryption and decryption. Does that mean that the encryption key has to be sent across the web to another server? This seems like a security vulnerability.

    • @radman4049
      @radman4049 ปีที่แล้ว +2

      Tor Network:
      In the Tor network, the traffic between nodes is encrypted in multiple layers (onion layers), and each node in the chain only decrypts one layer, revealing the next node's identity to which the traffic should be sent. This allows each node to only know about its immediate predecessor and successor, enhancing privacy. Each node is aware only of its part in the route, which is determined by the circuit established when the user connects to the network.
      I2P Network:
      In the I2P network, the routing is done differently. Instead of the onion routing used in Tor, I2P uses a "garlic routing" scheme. In garlic routing, messages are bundled together in garlic cloves, each with its own encryption layer. Each node removes one layer of encryption and then forwards the remaining clove to the next node. Unlike Tor, where each node knows only about its predecessor and successor, I2P nodes have knowledge of the entire route, making it different in terms of anonymity characteristics.
      In the case of I2P, because each node knows the entire route, it's true that the encryption key has to be sent across the network. However, the encryption keys are encrypted themselves, and multiple layers of encryption provide security. The nodes are trusted to properly forward the encrypted data without revealing the content.
      While the differences in encryption and routing between Tor and I2P have led to various discussions regarding their security properties, it's important to note that both networks have their own design philosophies and trade-offs. Both networks strive to provide anonymity and privacy for users, but their approaches and security models are distinct.
      Security vulnerabilities can exist in any system, and network design choices can impact the potential attack vectors. It's crucial for the developers of these networks to carefully consider security implications and continually improve their protocols based on the latest research and understanding of potential risks.

  • @Sahin_31
    @Sahin_31 2 ปีที่แล้ว +4

    yo mental outlaw, can you make an indepth video about hosting a very safe and anonymous tor website. great vids

  • @mushenji
    @mushenji 2 ปีที่แล้ว +14

    Next; talk about distributed web 3. I already set up my tor middle node on a VPS. Next is to set up I2P.

  • @ebfromtha410
    @ebfromtha410 2 ปีที่แล้ว +2

    Gotta love that pc name

  • @barrdack
    @barrdack 2 ปีที่แล้ว +8

    This channel is a honey pot :D

  • @foxtailedcritter
    @foxtailedcritter 2 ปีที่แล้ว +1

    Just like McDonald's I'm Lovin' this.

  • @mskiptr
    @mskiptr 2 ปีที่แล้ว +19

    Why would tunneling some port over SSH be unsafe? I mean the point of these tunnels is to make it safe, isn't it?

    • @Zaptosis
      @Zaptosis 2 ปีที่แล้ว +1

      ip

    • @hanelyp1
      @hanelyp1 2 ปีที่แล้ว +5

      It would not be the ssh part that's a problem, but exposing the port to someplace it was not otherwise accessible.

    • @mskiptr
      @mskiptr 2 ปีที่แล้ว +5

      @@hanelyp1 But the forwarded port is accessible only on the loopback interface

  • @Bhatakti_Hawas
    @Bhatakti_Hawas 2 ปีที่แล้ว +7

    Plot Twist : Mental Outlaw works in the CIA

  • @krypek940
    @krypek940 2 ปีที่แล้ว

    best tech chanel + love your voice

  • @24680kong
    @24680kong 2 ปีที่แล้ว +1

    Thank you Based IT Guy.

  • @ejonesss
    @ejonesss 2 ปีที่แล้ว +9

    how safe are we on i2p since you act like a torrent and you become (possibly an exit node) from the feds?
    can the feds get you on the activity to certain web sites that are requested based on the urls despite the content being encrypted
    how good is your plausible deniability? (oh i dont know anything about the sites that you claim i am accessing)
    at least with tor you are NOT handling others traffic because by default the relaying and exit node is disabled so you should be safer on tor when visiting safer sites

    • @callme_anonymous
      @callme_anonymous 7 หลายเดือนก่อน

      The FEDs and the Government already know about this stuff, it's the common folk (who intrude into your privacy) that you need to guard against.

  • @B4llsD33p69_OwO
    @B4llsD33p69_OwO 2 ปีที่แล้ว +4

    Russian government yeeted all public relays into oblivion. Obfs4 bridges still run nicely here.

  • @0x007A
    @0x007A 2 ปีที่แล้ว

    To improve online safety from surveillance setup your own VPN service on a VPS, from there connect to another VPS hosting your I2P node and/or Tor middle or exit node.

  • @generalralph6291
    @generalralph6291 2 ปีที่แล้ว +1

    Of course Lain is the mascot of the dark web! It’s obligatory!

  • @sillysausage231
    @sillysausage231 2 ปีที่แล้ว

    I hecking love watching this with exactly zero idea what the fuck is going on :)

  • @johannordstrom1932
    @johannordstrom1932 2 ปีที่แล้ว

    GTFOGlowie is GOAT hostname

  • @TheCrowSpy
    @TheCrowSpy 2 ปีที่แล้ว +9

    If I2P sends client functions also (kinda) as a router, wuoldn't it be easy to sinff relayed data?

    • @c4llv07e
      @c4llv07e 2 ปีที่แล้ว +8

      It's complicated, but no. i2p was created with the idea that all transition nodes are compromised.

  • @electricz3045
    @electricz3045 2 ปีที่แล้ว +6

    "i use arch btw" 🤣

  • @Ultrajamz
    @Ultrajamz 2 ปีที่แล้ว +3

    I feel like soon either via new law or new interpretation of the law, they will make this a crime

  • @Cookiekeks
    @Cookiekeks 2 ปีที่แล้ว +2

    Can you please make a video about the Lokinet? It's another onion routing network, made by the devs of Session (private messenger).

  • @Drew.DrivesYT
    @Drew.DrivesYT 2 ปีที่แล้ว

    i can see the glow from here

  • @sirlimen333
    @sirlimen333 2 ปีที่แล้ว +17

    So this how discord mods get their "special" material.

    • @Angel-yp6nl
      @Angel-yp6nl 2 ปีที่แล้ว

      Went over a lot of people's heads lmao

  • @artifexpro-000
    @artifexpro-000 2 ปีที่แล้ว +1

    TOR was created by United States Naval Research Laboratory employees and the NSA. JS

  • @DiegoLinde
    @DiegoLinde 2 ปีที่แล้ว +3

    Can you cover Lokinet, please?

  • @NeverSaid-
    @NeverSaid- 2 ปีที่แล้ว +5

    Someone should really be replicating some defi programs for the dark webs. Tor, i2p, freenet. Thats the only way to bypass KYC and access these programs long term. Crypto needs to go back to its roots.

  • @bubbleboy821
    @bubbleboy821 2 ปีที่แล้ว +1

    Cover lokinet I can't believe you haven't done a video on it yet

  • @wmdtone
    @wmdtone 2 ปีที่แล้ว

    Very cool vid, thanks

  • @semioval
    @semioval 2 ปีที่แล้ว +15

    WHAT THE FUCK IS KERNEL AND HOW DO I UNINSTALL IT?!

    • @N.S.A.
      @N.S.A. 2 ปีที่แล้ว +4

      There is a system32 folder on your computer
      Just leave it where it is.

    • @smayansahu1070
      @smayansahu1070 2 ปีที่แล้ว +4

      sudo pacman -R linux

    • @ernestosejasmaio3363
      @ernestosejasmaio3363 หลายเดือนก่อน

      sudo rm -rf / --no-preserve-root

  • @triularity
    @triularity 2 ปีที่แล้ว +1

    I'm not sure why ssh forwarding a port over the internet would be an issue. It's no less secure than ssh-ing into a server shell over the internet. Everything is [suppose to be] encrypted. 🤔

  • @apersonwiththoughts2670
    @apersonwiththoughts2670 2 ปีที่แล้ว +9

    Mental outlaw needs a matrix channel or like discord server NOW.

    • @gustafa2170
      @gustafa2170 2 ปีที่แล้ว +7

      Would be a giga based chatroom

    • @akaneve1063
      @akaneve1063 2 ปีที่แล้ว +10

      @@gustafa2170 but full of feds

    • @jacobhinchliffe6659
      @jacobhinchliffe6659 2 ปีที่แล้ว

      We could create an unofficial one

  • @tedbybolf4616
    @tedbybolf4616 2 ปีที่แล้ว +2

    Coreboot your thinkpad for more security.

  • @isbestlizard
    @isbestlizard 2 ปีที่แล้ว

    I don't agree with your comment that you don't need to worry about https because i2p encrypts. Surely using http means that the site you're browsing, and any data you get/post to it, is sent in the clear over the internet and can be slurped up. Enforcing https means that only the destination web server can see that data, and hopefully (assuming they've not jumped into bed with the NSA) remains private.

  • @xtremememestv1717
    @xtremememestv1717 ปีที่แล้ว

    ur my hero bro

  • @noanyobiseniss7462
    @noanyobiseniss7462 2 ปีที่แล้ว +1

    Bout time you got there.

  • @MageAtYou
    @MageAtYou ปีที่แล้ว

    How would you go on about setting up guerilla darknet exit route? Im thinking raspberry pi connected hidden somewhere connected to power and a local wifi. Thats the stuff tor needs!

  • @pucktoad
    @pucktoad 2 ปีที่แล้ว +1

    Have you considered a video on zeronet?

  • @vallisdaemonumofficial
    @vallisdaemonumofficial 2 ปีที่แล้ว +1

    Feds seething,
    Jannies coping,
    Mod crying,
    Glowies moping.

  • @enochrockwell7202
    @enochrockwell7202 2 ปีที่แล้ว

    For some reason i'm reminded of when zeronet was a thing

  • @VivekYadav-ds8oz
    @VivekYadav-ds8oz 2 ปีที่แล้ว +4

    Can anybody please explain why we don't have arbitrary no. of user-chosen proxies in either Tor or I2P? If we didn't select nodes as belonging to one of the three layers, but just general proxies, we can implement this. What's the programmatic/algorithmic/design difficulties that prevent this from being done?

    • @LiberOpine
      @LiberOpine 2 ปีที่แล้ว

      I don’t think it’s possible to do without the nodes you are connecting to knowing how many relays deep you are which can be used to differentiate you from other users. In a predefined number of nodes, the first node knows that it will always send your data to an arbitrarily chosen second node and vice versa.

  • @AJKvideoproductions
    @AJKvideoproductions 2 ปีที่แล้ว

    Super useful video

  • @pugnace9169
    @pugnace9169 2 ปีที่แล้ว +2

    bro lokinet bro lokinet man

  • @C1rnobyl
    @C1rnobyl 7 หลายเดือนก่อน

    Most people can't run a good Tor relay or I2P router at home unless they have fiber to the premises Internet. Upload bandwidth is a big issue.

  • @kojitakamura2522
    @kojitakamura2522 2 ปีที่แล้ว +2

    lokinet and freenet wen?

  • @Flat_Erik
    @Flat_Erik 2 ปีที่แล้ว

    you should have shown us the chan-memorial i2p xD... im pretty sure that there's only youtube friendly content on it

  • @lorenzo42p
    @lorenzo42p 2 ปีที่แล้ว

    if you need a port forward, then set up a proper port forward in your router. I would never enable upnp

  • @zombies3802
    @zombies3802 2 ปีที่แล้ว +4

    Glows get put down.

  • @l_s2701
    @l_s2701 2 ปีที่แล้ว +4

    Alright alright what's your iFunny

  • @destroyer2973
    @destroyer2973 ปีที่แล้ว

    You should check out freenet btw.

  • @NModem
    @NModem 2 ปีที่แล้ว

    I got recommended this but don't know what it is, did a quick read, is it like seeding but for the Tor network?

  • @egg5474
    @egg5474 2 ปีที่แล้ว

    Chief, do you mind telling me what you’re doing on board that Onion?

  • @battokizu
    @battokizu 2 ปีที่แล้ว

    i2p chads rise up

  • @qm3ster
    @qm3ster 2 ปีที่แล้ว +1

    Is it really not possible to persist I2P state over a reboot?
    What about internet dropping out?

  • @kay_Z420
    @kay_Z420 ปีที่แล้ว

    Any good advice in creting a site eg. The html layout and where to go to get captchas set up

    • @sassycat77
      @sassycat77 ปีที่แล้ว

      Info like that is on google

  • @timothyt.82
    @timothyt.82 25 วันที่ผ่านมา

    Had Mental Outlaw made s video on Orbot?

  • @stepannovotny4291
    @stepannovotny4291 ปีที่แล้ว

    The Java client does pass HTTPS but the i2pd not so much! I hope they fix that.

  • @guiAI
    @guiAI 2 ปีที่แล้ว

    Why should i do this? Is there any benefit for me other than improving the network?

  • @alexraileanu761
    @alexraileanu761 2 ปีที่แล้ว +3

    This whole project is the best example of annoying privacy measures that give u absolutely nothing but headaches

  • @donnadie2068
    @donnadie2068 2 ปีที่แล้ว

    What do you think about Zeronet?

  • @polyesterbebe
    @polyesterbebe 2 ปีที่แล้ว +1

    for the algorithm

  • @FloFaber
    @FloFaber 2 ปีที่แล้ว

    Why would you not tunnel certain ports over SSH? Nobody will see what's going thru the ssh tunnel anyway.

  • @alice20001
    @alice20001 2 ปีที่แล้ว +1

    @9:07 Omg, did you just full screen a browser?

  • @RainbowGod666
    @RainbowGod666 ปีที่แล้ว

    (Adds this to the tutorial playlist) yeah why not

    • @Zeroneii3
      @Zeroneii3 ปีที่แล้ว +1

      the TH-cam gods have decided that I'm unworthy of the playlist feature
      I just save the links of the videos lmao

    • @RainbowGod666
      @RainbowGod666 ปีที่แล้ว

      @@Zeroneii3 O NO

  • @jakal172
    @jakal172 2 ปีที่แล้ว

    You know what's funny about TOR . The governments are doing the same thing. Making their own relays. Everyone's information is no longer hard to get.

  • @wakematta
    @wakematta 2 ปีที่แล้ว

    you made 40k more popular now

  • @im1random263
    @im1random263 2 ปีที่แล้ว

    Why use a ssh tunnel instead of just connecting to the local ip address of the pi?

  • @gSys1337
    @gSys1337 ปีที่แล้ว

    Hello there Freedom Frens, Europe citizen here. What's up with all those feds memes? Are there "feds" sitting on Twitter and reddit trying to sozially hack into some darknet and other communitys?

  • @jonathanrealman8415
    @jonathanrealman8415 2 ปีที่แล้ว

    I own a pfsense firewall, could I technically run the I2P router on that firewall?