Findmysec

joined 2 months ago
[–] Findmysec@infosec.pub 8 points 1 day ago

If only people with the resources would seed

[–] Findmysec@infosec.pub 10 points 1 day ago

It's very easy to set up. Windows now has a slick installer.

[–] Findmysec@infosec.pub 4 points 1 day ago

The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it's design, doesn't even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).

Thanks

[–] Findmysec@infosec.pub 16 points 2 days ago (1 children)

Unfortunately, Qbittorrent's I2P support is still experimental. Assuming your seedbox provider can let you run BiglyBT or any other client that can cross-seed, all you have to do is add I2P trackers to your torrent file. You can also upload your torrent files to Postman on I2P for them to be registered.

[–] Findmysec@infosec.pub 8 points 2 days ago

VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.

I will repeat what I said to the other commenter: please read the documentation. Being a router doesn't mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there's a zero day I'm unaware of, you are perfectly safe.

[–] Findmysec@infosec.pub 5 points 2 days ago* (last edited 2 days ago) (7 children)

VPNs log your IP. And Mullvad doesn't allow port-forwarding, which means you can't seed.

Being a node for traffic doesn't mean it can be linked to your identity, because everything is encrypted and metadata is scrambled. TOR node operators take much greater risks because depending on how they have set it up, it can lead to their identity being compromised. It's a small chance but it can happen.

I can't convince you. I only hope that people start seeing the need for it and begin reading the documentation to see its strengths

[–] Findmysec@infosec.pub 9 points 2 days ago

I2P is P2P, TOR is not. That is the gist of the matter

[–] Findmysec@infosec.pub 22 points 2 days ago (22 children)

A VPN company can easily give up your details to the police who are now actively going after citizens. VPNs are not enough anymore.

Is there a problem with I2P adoption? I'm sensing a massive lack of interest from this thread

[–] Findmysec@infosec.pub 11 points 2 days ago

Install Gentoo on her MacBook

[–] Findmysec@infosec.pub 1 points 3 days ago
[–] Findmysec@infosec.pub 3 points 4 days ago (2 children)

Would you know where I can find a guide to load balance I2P routers?

[–] Findmysec@infosec.pub 3 points 4 days ago (1 children)

Thank you, this is very helpful. I'll read

view more: ‹ prev next ›