0v0

joined 2 years ago
[–] 0v0@sopuli.xyz 4 points 1 year ago

We have those on I2P already, see tracker2.postman.i2p for example.

[–] 0v0@sopuli.xyz 5 points 1 year ago (1 children)

Was it found near birch? Possibly Leccinum scabrum.

[–] 0v0@sopuli.xyz 12 points 1 year ago (1 children)

You should not torrent over the tor network, but you can torrent over the I2P network. qBittorrent even has experimental I2P support built in.

[–] 0v0@sopuli.xyz 3 points 1 year ago (1 children)

Have you tried running tcpdump / wireshark on another device in the network when this happened?

[–] 0v0@sopuli.xyz 1 points 2 years ago (1 children)

Here is a config template to run an obfs4 bridge, make changes as required:

BridgeRelay 1

# Replace "TODO1" with a Tor port of your choice.
# This port must be externally reachable.
# Avoid port 9001 because it's commonly associated with Tor and censors may be scanning the Internet for this port.
ORPort TODO1

ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy

# Replace "TODO2" with an obfs4 port of your choice.
# This port must be externally reachable and must be different from the one specified for ORPort.
# Avoid port 9001 because it's commonly associated with Tor and censors may be scanning the Internet for this port.
ServerTransportListenAddr obfs4 0.0.0.0:TODO2

# Local communication port between Tor and obfs4.  Always set this to "auto".
# "Ext" means "extended", not "external".  Don't try to set a specific port number, nor listen on 0.0.0.0.
ExtORPort auto

# Replace "" with your email address so we can contact you if there are problems with your bridge.
# This is optional but encouraged.
ContactInfo 

# Pick a nickname that you like for your bridge.  This is optional.
Nickname PickANickname

You can also use the reachability test to check if everything is configured correctly. If it is reachable and bootstrapping reaches 100% you should be set.

Set SocksPort if you want to connect your browser (don't confuse this with ORPort). Default is localhost:9050.

[–] 0v0@sopuli.xyz 3 points 2 years ago (3 children)

I'm not on NixOS, but I have a decent working knowledge of Tor.

Not quite clear on what you're trying to do, are you trying to run a relay, or just connecting to the Tor network and pointing your browser to the socks proxy?

Arti (the official Tor implementation in Rust) is not a complete replacement for the Tor C implementation yet. Hidden service support is disabled by default (due to the lack of a security feature that could allow guard discovery attacks), and bridges don't work either. If you don't understand Tor very well stick with the old router.

[–] 0v0@sopuli.xyz 4 points 2 years ago (1 children)

I thought about torrents, but found no way to do that privately either.

You can torrent privately using I2P (It's like Tor but peer-to-peer). The Java router comes with a pre-installed torrent client, accessible from the console. After installing and setting up your browser you can browse the main tracker at tracker2.postman.i2p.

[–] 0v0@sopuli.xyz 3 points 2 years ago (1 children)

I occasionally experience the same thing. When this happens, it appears the jwt token is not sent with the initial request (thus appearing to be logged out), but it is sent with api requests on the same page (unread_count, list, etc.), so the cookie is not lost (document.cookie also shows it). Sometimes refreshing again fixes it, but I haven't yet found a good workaround. I'll experiment a bit next time it happens.

[–] 0v0@sopuli.xyz 4 points 2 years ago
[–] 0v0@sopuli.xyz 12 points 2 years ago

Indeed. This works because direct connections to the tor network are easily censored, but WebRTC is not (not without a lot of collateral damage at least).

[–] 0v0@sopuli.xyz 68 points 2 years ago (3 children)

The snowflake proxy acts as a bridge to the tor network at the entry side. If by repercussions you mean risk of exit-node traffic, there are none. It might cost a little bit of bandwidth.

view more: ‹ prev next ›