Ancestors

Toot

Written by Findmysec@infosec.pub on 2024-09-14 at 13:51

Reminder: seeders, please seed on I2P

https://infosec.pub/post/17541103

=> More informations about this toot | More toots from Findmysec@infosec.pub

Descendants

Written by SomeLemmyUser on 2024-09-14 at 14:02

Is this needed when using a VPN?

=> More informations about this toot | More toots from Jean_le_Flambeur@discuss.tchncs.de

Written by Imgonnatrythis@sh.itjust.works on 2024-09-14 at 14:28

It’s not big at all. But agree, this is the way.

=> More informations about this toot | More toots from Imgonnatrythis@sh.itjust.works

Written by ExcessShiv@lemmy.dbzer0.com on 2024-09-14 at 14:40

A proper VPN provider is sufficient to protect against this though. If you, as a Swedish citizen, weren’t already using a VPN, you were being an idiot.

=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-14 at 15:33

A VPN company can easily give up your details to the police who are now actively going after citizens. VPNs are not enough anymore.

Is there a problem with I2P adoption? I’m sensing a massive lack of interest from this thread

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Abnorc@lemm.ee on 2024-09-14 at 15:56

I admit that I’m skeptical since everyone is a node. It probably is fine, but I don’t know the risks that I take by volunteering as a node. I thought that VPNs can be fine as long as they don’t store logs, but I could be mistaken.

=> More informations about this toot | More toots from Abnorc@lemm.ee

Written by Findmysec@infosec.pub on 2024-09-14 at 16:47

VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.

I will repeat what I said to the other commenter: please read the documentation. Being a router doesn’t mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there’s a zero day I’m unaware of, you are perfectly safe.

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by ReversalHatchery@beehaw.org on 2024-09-14 at 19:17

as a node

=> More informations about this toot | More toots from ReversalHatchery@beehaw.org

Written by onlinepersona@programming.dev on 2024-09-14 at 19:29

Being a node isn’t an issue. The traffic is encrypted, the destinations are unknown to the nodes themselves, and the traffic does not leave the overlay network (I2P). In TOR, you also have something similar, but the traffic can exit the overlay network but to do so, your node must be an exit node. I2P nodes are internal by default and it’s not that easy to make it an exit node.

You are very safe being a node in I2P.

Anti Commercial-AI license

=> More informations about this toot | More toots from onlinepersona@programming.dev

Written by ExcessShiv@lemmy.dbzer0.com on 2024-09-14 at 16:04

A good VPN won’t have any details to hand over that will convict you, even if they wanted to (e.g. mullvad), so they most definitely are enough.

And police are not going after citizens, rights holder are (like they always have been) by using ISPs.

=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-14 at 16:44

VPNs log your IP. And Mullvad doesn’t allow port-forwarding, which means you can’t seed.

Being a node for traffic doesn’t mean it can be linked to your identity, because everything is encrypted and metadata is scrambled. But if you think like that I suppose you aren’t very interested in running TOR relays or exits either.

I can’t convince you. I only hope that people start seeing the need for it and begin reading the documentation to see its strengths

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by ExcessShiv@lemmy.dbzer0.com on 2024-09-14 at 16:54

But if you think like that I suppose you aren’t very interested in running TOR relays or exits either.

No, I’m not at all interested in that either. I don’t want to risk any nefarious traffic that I have no control over running through my network.

I get the appeal of I2P and I can absolutely see the value it can bring. But as long as I will have to be a node for other random peoples traffic, I’ll pass.

=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com

Written by Scary le Poo on 2024-09-14 at 17:48

I feel as though this take is fully fud. It sounds like a take that came from seeing tons of advertisements for vpns without really understanding how they work. Maybe I’m wrong about you. That said, in general, a VPN is not a great cloak for piracy.

=> More informations about this toot | More toots from Scary_le_Poo@beehaw.org

Written by ExcessShiv@lemmy.dbzer0.com on 2024-09-14 at 18:06

If there was a completely zero percent risk that I would be used as a node for something truly horrible, I also wouldn’t mind. But I’d rather torrent with a slightly elevated risk rather than enabling things that should not be enabled. By torrenting with a VPN, at least j have the control over what happens on my network and exactly what data I’m part of sharing.

=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com

Written by ReversalHatchery@beehaw.org on 2024-09-14 at 19:25

there is 0% risk until your country makes a law that prohibits any and all P2P communication. That would not only break torrents, but would thwart signal/telegram/whatsapp calls too, Jitsi meetings, probably google meet and zoom too, as all those use P2P traffic for performance.

So far there are only such laws in far east countries, and the official java I2P router is smart enough to not participate in routing when you are in such a place.

Also, I think for routing to work you need to open a port, without it that won’t be done.

=> More informations about this toot | More toots from ReversalHatchery@beehaw.org

Written by tate on 2024-09-14 at 20:46

I use Mulvad, and seeding seems to work for me. Am I missing something?

=> More informations about this toot | More toots from tate@lemmy.sdf.org

Written by liveinthisworld@lemmy.dbzer0.com on 2024-09-15 at 03:49

That shouldn’t be possible in theory unless I don’t know it well enough. Care to provide a screenshot?

=> More informations about this toot | More toots from liveinthisworld@lemmy.dbzer0.com

Written by 1984@lemmy.today on 2024-09-14 at 19:11

If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.

=> More informations about this toot | More toots from 1984@lemmy.today

Written by onlinepersona@programming.dev on 2024-09-14 at 19:26

If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.

You have to trust that the VPN provider doesn’t store logs. I2P is pretty much trustless besides where the binary comes from, but you can even compile it yourself.

Anti Commercial-AI license

=> More informations about this toot | More toots from onlinepersona@programming.dev

Written by adr1an on 2024-09-14 at 22:05

Mullvad is trustworthy (imho, and because of audits).

Anyway, you can have both, and run purple i2p with blackjack and torrents!

=> More informations about this toot | More toots from anzo@programming.dev

Written by lud@lemm.ee on 2024-09-15 at 02:43

Mullvad is great. I unfortunately had to switch because they removed port forwarding, but I highly wish they didn’t.

=> More informations about this toot | More toots from lud@lemm.ee

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-15 at 17:12

What do you use now? AirVPN? Proton?

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by lud@lemm.ee on 2024-09-15 at 18:46

I switched to AirVPN after I used mullvad but I was not that happy with their speeds (max was around 500-600 Mbit/s), so I now use Proton.

Proton is nice except that the port changes with every connection. Fortunately I found a fork of the VPN app that has support for automatically changing the port in qbittorrent. Other than that I’m pretty happy with Proton. :)

=> More informations about this toot | More toots from lud@lemm.ee

Written by Robust Mirror on 2024-09-15 at 02:55

I use PIA, cheap and they’ve been involved in at least 2 court cases where their no logging policies were proven.

=> More informations about this toot | More toots from Robust_Mirror@aussie.zone

Written by Findmysec@infosec.pub on 2024-09-14 at 20:22

The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it’s design, doesn’t even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).

Thanks

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by foremanguy on 2024-09-15 at 08:40

No logs policy are not trustworthy

=> More informations about this toot | More toots from foremanguy92_@lemmy.ml

Written by Jessica@discuss.tchncs.de on 2024-09-15 at 02:38

You also need to fully encrypt the traffic in your bit torrent client. You will get fewer peers, but it’s much safer

=> More informations about this toot | More toots from Jessica@discuss.tchncs.de

Written by unrushed233@lemmings.world on 2024-09-15 at 11:09

Doesn’t I2P encrypt the traffic already?

=> More informations about this toot | More toots from unrushed233@lemmings.world

Written by melroy on 2024-09-14 at 14:54

https://geti2p.net/en/ looks like Tor. but it is not the same?

=> More informations about this toot | More toots from melroy@kbin.melroy.org

Written by sploodged@lemmy.dbzer0.com on 2024-09-14 at 15:00

similar yes but not the same. tor held together by volunteer that run nodes, i2p everyone is a node. tor good for clearnet things, i2p good for in-network things. torrenting in i2p is good for i2p, not tor. torrenting in i2p stays in the i2p network, doesn’t go through exit nodes. there’s only about 3 of those. it’s torrenting as a darknet hidden service.

=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com

Written by melroy on 2024-09-14 at 15:02

Yeah, thanks for clearing this up. I was also reading: https://geti2p.net/en/comparison/tor if people want to know more in depth.

=> More informations about this toot | More toots from melroy@kbin.melroy.org

Written by melroy on 2024-09-14 at 15:03

After reading that whole page, I think your point is missing.. The use case of Tor and i2p isn't correctly explained on that site.

=> More informations about this toot | More toots from melroy@kbin.melroy.org

Written by sploodged@lemmy.dbzer0.com on 2024-09-14 at 15:27

yeah some of the docs on the official site lean more technical than practical

=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-14 at 15:34

I2P is P2P, TOR is not. That is the gist of the matter

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by AlexWIWA@lemmy.ml on 2024-09-14 at 19:56

Does being a node open one to liability?

=> More informations about this toot | More toots from AlexWIWA@lemmy.ml

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-14 at 21:05

No, since they don’t act as exit nodes “they’re called outproxies in the I2P space”, unless you specifically configure that. It’s like running a Tor middle/guard relay. I2P was specifically designed that way, so everyone can use I2P and be a node by default without causing any trouble.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 03:35

Unless there’s a zero-day, no. All traffic is encrypted and it should be impossible to correlate traffic chunks to identities like that

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by 8andage@sh.itjust.works on 2024-09-15 at 08:36

I tried to find the answer to this in i2p docs, maybe you would know more

As I understand, i2p traffic still needs to send packets over TCP/IP, so what stops the nodes you communicate with from knowing your IP? Its the only thing that makes me cagey about it since other p2p services like local game servers require sharing your IP to work. Hoping to get back into torrenting, thanks!

=> More informations about this toot | More toots from 8andage@sh.itjust.works

Written by sploodged@lemmy.dbzer0.com on 2024-09-15 at 17:22

Here’s the scary sounding part that can be counterintuitive. The routers you’re communicating with do know your ip, since they have to like you mentioned. Your ip address is also in i2p’s DHT as a “router info” which functions as a network addressbook for routers and services so things can be found without needing a centralized lookup service. Again, because for the network to work, routers need to be able to find eachother, or they can’t communicate.

But, routers function on a need to know basis. i2p uses separate up and down links for each tunnel, and your side of the tunnel by default has 3 hops. other side usually also has 3 hops. typical unidirectional tunnel looks like this with total of 7 hops:

A-x-x-x=x-x-x-B

None of the chains in the link know what position they’re in (except for the endpoints). They also don’t know how long the whole tunnel is, since the sender and receiver only know their parts of the tunnel. On the dht side, by design no single router has a whole view of the network, but there isn’t a whole lot of information you get from that other than knowing that person at stated ip address uses i2p, which your isp would be able to tell for example anyway just like using tor or a vpn.

The way i made sense of it was like you have an envelope that is inside several other envelopes, with each envelope representing a layer of encryption. You get an envelope from kevin, so you know kevin. You open the envelope and see another envelope addressed to george, you give the envelope to him. So you know kevin and george. But the rest is unknown to you. You don’t know who the true originator of the envelope is or where the message is ultimately going.

=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com

Written by 8andage@sh.itjust.works on 2024-09-15 at 21:37

So ip is only visible to the first/last hop, and they wouldnt know where youre going. That helps, thanks!

=> More informations about this toot | More toots from 8andage@sh.itjust.works

Written by aida@lemm.ee on 2024-09-14 at 16:36

seed!!! I have already started my i2p setup and i will donate my bandwith

=> More informations about this toot | More toots from aida@lemm.ee

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-14 at 17:39

Does anyone know of a fairly uncomplicated method to set up my seedbox, so I can seed on the clearnet and I2P at the same time, without having to store two copies of all my torrents? I already seed terrabytes of torrent data, and I don’t want to store duplicates of all that.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-14 at 18:47

Unfortunately, Qbittorrent’s I2P support is still experimental. Assuming your seedbox provider can let you run BiglyBT or any other client that can cross-seed, all you have to do is add I2P trackers to your torrent file. You can also upload your torrent files to Postman on I2P for them to be registered.

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-14 at 21:02

Thanks for the informative reply

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by ReversalHatchery@beehaw.org on 2024-09-14 at 19:12

I know nothing about seedboxes, but on a computer you can point multiple torrents to the same directory. If you make it read-only, by permission or mount options or whatever, the torrent client can’t even fuck it up

=> More informations about this toot | More toots from ReversalHatchery@beehaw.org

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-14 at 21:02

I know nothing about seedboxes

It’s basically just a cheap virtual server running e.g. Deluge or ruTorrent, hosted by a torrent-friendly provider in some country that doesn’t give a fuck about DMCA notices. Most don’t allow the user to access the underlying Linux system though, but mine does actually give me a root shell.

I’m gonna have to look into deploying another torrent client on the seedbox, besides my current ruTorrent installation. My provider also offers dedicated servers. They’re more expensive, but I might go with one so I can seed on the clearnet and I2P. It will probably have enough overhead CPU, RAM and bandwidth, so I can also run a Tor node and maybe IPFS.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 03:34

I’m assuming your seedbox providers allows you root access to the server? Which provider is this?

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-15 at 08:25

I currently use GigaRapid, because they are one of the few providers that let me pay with Monero. If I find a better provider, I might switch though.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 12:31

Which plan? I used to use them too

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-15 at 12:50

Currently on Iridium G10, I was on Gold G10 before, but ran out of storage. It’s pretty expensive though, and I’m open for better suggestions. I think the next one I’m gonna try out is AppBox. Unfortunately no XMR, but they offer other crypto currencies such as BTC, ETH, LTC, BCH and others. seedboxes.cc also seems interesting.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 14:06

I still have one of their ECO boxes but it’s not doing much. I haven’t torrented anything in the last 2 months I think (didn’t find a need to).

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-15 at 17:11

Ok well the ECO boxes don’t really work as a seedbox, as they’re highly limited in bandwidth. Even if I don’t download anything, I still seed the torrent for others to download it. That’s the main purpose of a seedbox I guess. Since your ECO box only really acts as a downloader anyway, wouldn’t it be easier and cheaper to just get a VPN for downloading torrents, or a service like RealDebrid?

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 17:39

I do seed stuff (I downloaded a TV show of around 40GB last month and I’ve been seeding it since). It just keeps seeding at full speed till the time they throttle my bandwidth. Last I checked I was over 15 in ratio for that thing, but whatever.

I will eventually move to a VPS provider who doesn’t mind public torrents (I’ll pay through XMR). This seems like a much better idea since my needs have diversified and I’d like everything together on one machine to save costs. There’s other ways to use your seedbox too (without root access) and seed stuff that people really need/are deprived of (vague description on purpose).

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-15 at 18:54

I will eventually move to a VPS provider who doesn’t mind public torrents

There aren’t many providers where this is the case, that’s why I’m looking into getting a cheap dedicated server from an actual seedbox provider. Some have them, e.g. RapidSeedbox and seedhost.eu. RapidSeedbox dedicated servers are really expensive though.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-15 at 21:39

Just find an unit with unmetered bandwidth, why do you need dedi?

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-16 at 20:32

This was actually meant as a suggestion for you, since you mentioned that you want to put all of your stuff, including the seedbox, onto one single cloud server (hosted by a provider that allows this), so I recommended to just get a cheap dedicated server from an actual seedbox provider.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-16 at 20:36

Well, you’re right. If the provider I have in mind evaporates one day I’ll probably have to do that.

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-16 at 21:18

Is there any reason why you can’t name the provider you have in mind? Perhaps in a DM?

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by Findmysec@infosec.pub on 2024-09-16 at 21:25

If I say it here I might dox myself. I’d like for it to be a PGP conversation but I’m not quite there yet either (due to personal reasons). Sorry

=> More informations about this toot | More toots from Findmysec@infosec.pub

Written by Andromxda 🇺🇦🇵🇸🇹🇼 on 2024-09-16 at 21:34

Would Matrix be fine? You can find my user name in my profile.

=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com

Written by oscardejarjayes [comrade/them] on 2024-09-14 at 18:53

=> More informations about this toot | More toots from oscardejarjayes@hexbear.net

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113136232253769936
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
515.915017 milliseconds
Gemini-to-HTML Time
29.513326 milliseconds

This content has been proxied by September (3851b).