- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Are the red caps just a coincidence? Because lately, the more videos I see of him, the more conservative he seems to me
Sneed.
i mean the dude does end up uploading a torrent of a jordan p*terson video as an example so that’s pretty sus, at the very least
His actual computer related stuff has good advice in it but a lot surrounding that advice is indeed pretty sus or extrapolates to clownish end analysis. Like Ford patenting a speeding snitcher to put in their cars that reports other nearby speeding vehicles to the police is going to lead to the end of non-autonomous driving. I wonder if “car dependency” means anything to him. Just engage with it critically.
“just engage with him critically”
how about i just follow better channels instead lmao
Guy has always been a far right-wing cuck
Adoption is the main problem. The more people that will use I2P the better. Also crosseeding helps a load to.
Is seeding anonymous?
When done solely over I2P, yes.
Say you download from the clearweb then use a VPN. Then reseed that downloaded file straight to I2P.
i misread that as
Also crossdressing helps […]
and i didnt even question it
The next step after programmer socks
also just known as regular socks if you use i2p
But crossdressing does help a load
If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?
There’s nothing saying that tomorrow this isn’t the case. Laws are fluid, just because they won’t come after people currently for small time piracy does not mean that won’t change.
Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.
I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.
Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.
Because it makes the point for a more solid technology as far as privacy is concerned?
Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?
It is not the only point when it comes to adopting technologies, when it comes to maximizing privacy, yes maximizing privacy is tautologically the only point.
In germany they fine your ass if they find out you’re torrenting.
That’s not what I was talking about?
You can’t connect to pairs outside the i2p network And i personally haven’t found any active torrenting community for p2p So yeah i2p is really cool, but i don’t think you can pirate over it just yet
Does p2p over i2p require port forwarding? I have a cheap vpn (surfshark) that does not have port forwarding and i am almost never able to seed over it. Will seeding over i2p require port forwarding?
It functions without port forwarding, but it’s much better with. While I can’t speak for the Java client, i2pd has support for UPnP, which might make things easier in some environments. You also don’t need a VPN for I2P, since the network takes care of the anonymising
it’s generally advisable to not run a vpn in front of i2p. it will run better without one and you introduce another point of failure that can reduce your anonymity in some circumstances.
Can’t answer that sorry, i barely tried i2p
That’s why we need more adoption.
http://tracker2.postman.i2p are u sure? And also u can conbect to outside world with special proxy
Tell me more about this special proxy
https://mk16.de/Computer/Tutorials/i2p_outproxy/outproxies_in_i2p-english.pdf simple and detailed explanation as the same time
Link broken?
Fixed
Thanks
postman tracker was already shared somewhere around here, i recommend checking that out
ofc it’s nowhere near the level of clearnet but i’ve had good luck finding technical books as a test
download speed was pretty abysmal when i tried it a few years ago though so i didnt bother with anything bigger than 1 gb or so (took a few days to download a sizable book compilation)
Postman has a quite active community, you can find a lot of stuff there already. It’s not quite on the level of clearnet torrenting yet, of course, but it can very much stand on its own
we’re trying, also some clients will let you do that. snark and XD are i2p only, qbittorrent and bigly bt will let you pull peers from clearnet and i2p if they’ve been cross-seeded
But then you give away your ip, no?
you can use a vpn for clearnet like normal along with i2p,ideally i2p not through the vpn though. it’s a good way to cross-seed stuff into i2p though (you can do this as you’re downloading from clearnet peers) and every now and again might find some random i2p seed holdout on a “rare” torrent.
Love it when Mental Outlaw makes a video about i2p
Check out his other i2p videos