Reminder: seeders, please seed on I2P
https://infosec.pub/post/17541103
=> More informations about this toot | More toots from Findmysec@infosec.pub
Is this needed when using a VPN?
=> More informations about this toot | More toots from Jean_le_Flambeur@discuss.tchncs.de
It’s not big at all. But agree, this is the way.
=> More informations about this toot | More toots from Imgonnatrythis@sh.itjust.works
A proper VPN provider is sufficient to protect against this though. If you, as a Swedish citizen, weren’t already using a VPN, you were being an idiot.
=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com
A VPN company can easily give up your details to the police who are now actively going after citizens. VPNs are not enough anymore.
Is there a problem with I2P adoption? I’m sensing a massive lack of interest from this thread
=> More informations about this toot | More toots from Findmysec@infosec.pub
I admit that I’m skeptical since everyone is a node. It probably is fine, but I don’t know the risks that I take by volunteering as a node. I thought that VPNs can be fine as long as they don’t store logs, but I could be mistaken.
=> More informations about this toot | More toots from Abnorc@lemm.ee
VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.
I will repeat what I said to the other commenter: please read the documentation. Being a router doesn’t mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there’s a zero day I’m unaware of, you are perfectly safe.
=> More informations about this toot | More toots from Findmysec@infosec.pub
as a node
=> More informations about this toot | More toots from ReversalHatchery@beehaw.org
Being a node isn’t an issue. The traffic is encrypted, the destinations are unknown to the nodes themselves, and the traffic does not leave the overlay network (I2P). In TOR, you also have something similar, but the traffic can exit the overlay network but to do so, your node must be an exit node. I2P nodes are internal by default and it’s not that easy to make it an exit node.
You are very safe being a node in I2P.
Anti Commercial-AI license
=> More informations about this toot | More toots from onlinepersona@programming.dev
A good VPN won’t have any details to hand over that will convict you, even if they wanted to (e.g. mullvad), so they most definitely are enough.
And police are not going after citizens, rights holder are (like they always have been) by using ISPs.
=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com
VPNs log your IP. And Mullvad doesn’t allow port-forwarding, which means you can’t seed.
Being a node for traffic doesn’t mean it can be linked to your identity, because everything is encrypted and metadata is scrambled. But if you think like that I suppose you aren’t very interested in running TOR relays or exits either.
I can’t convince you. I only hope that people start seeing the need for it and begin reading the documentation to see its strengths
=> More informations about this toot | More toots from Findmysec@infosec.pub
But if you think like that I suppose you aren’t very interested in running TOR relays or exits either.
No, I’m not at all interested in that either. I don’t want to risk any nefarious traffic that I have no control over running through my network.
I get the appeal of I2P and I can absolutely see the value it can bring. But as long as I will have to be a node for other random peoples traffic, I’ll pass.
=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com
I feel as though this take is fully fud. It sounds like a take that came from seeing tons of advertisements for vpns without really understanding how they work. Maybe I’m wrong about you. That said, in general, a VPN is not a great cloak for piracy.
=> More informations about this toot | More toots from Scary_le_Poo@beehaw.org
If there was a completely zero percent risk that I would be used as a node for something truly horrible, I also wouldn’t mind. But I’d rather torrent with a slightly elevated risk rather than enabling things that should not be enabled. By torrenting with a VPN, at least j have the control over what happens on my network and exactly what data I’m part of sharing.
=> More informations about this toot | More toots from ExcessShiv@lemmy.dbzer0.com
there is 0% risk until your country makes a law that prohibits any and all P2P communication. That would not only break torrents, but would thwart signal/telegram/whatsapp calls too, Jitsi meetings, probably google meet and zoom too, as all those use P2P traffic for performance.
So far there are only such laws in far east countries, and the official java I2P router is smart enough to not participate in routing when you are in such a place.
Also, I think for routing to work you need to open a port, without it that won’t be done.
=> More informations about this toot | More toots from ReversalHatchery@beehaw.org
I use Mulvad, and seeding seems to work for me. Am I missing something?
=> More informations about this toot | More toots from tate@lemmy.sdf.org
That shouldn’t be possible in theory unless I don’t know it well enough. Care to provide a screenshot?
=> More informations about this toot | More toots from liveinthisworld@lemmy.dbzer0.com
If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.
=> More informations about this toot | More toots from 1984@lemmy.today
If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.
You have to trust that the VPN provider doesn’t store logs. I2P is pretty much trustless besides where the binary comes from, but you can even compile it yourself.
Anti Commercial-AI license
=> More informations about this toot | More toots from onlinepersona@programming.dev
Mullvad is trustworthy (imho, and because of audits).
Anyway, you can have both, and run purple i2p with blackjack and torrents!
=> More informations about this toot | More toots from anzo@programming.dev
Mullvad is great. I unfortunately had to switch because they removed port forwarding, but I highly wish they didn’t.
=> More informations about this toot | More toots from lud@lemm.ee
What do you use now? AirVPN? Proton?
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
I switched to AirVPN after I used mullvad but I was not that happy with their speeds (max was around 500-600 Mbit/s), so I now use Proton.
Proton is nice except that the port changes with every connection. Fortunately I found a fork of the VPN app that has support for automatically changing the port in qbittorrent. Other than that I’m pretty happy with Proton. :)
=> More informations about this toot | More toots from lud@lemm.ee
I use PIA, cheap and they’ve been involved in at least 2 court cases where their no logging policies were proven.
=> More informations about this toot | More toots from Robust_Mirror@aussie.zone
The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it’s design, doesn’t even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).
Thanks
=> More informations about this toot | More toots from Findmysec@infosec.pub
No logs policy are not trustworthy
=> More informations about this toot | More toots from foremanguy92_@lemmy.ml
You also need to fully encrypt the traffic in your bit torrent client. You will get fewer peers, but it’s much safer
=> More informations about this toot | More toots from Jessica@discuss.tchncs.de
Doesn’t I2P encrypt the traffic already?
=> More informations about this toot | More toots from unrushed233@lemmings.world
https://geti2p.net/en/ looks like Tor. but it is not the same?
=> More informations about this toot | More toots from melroy@kbin.melroy.org
similar yes but not the same. tor held together by volunteer that run nodes, i2p everyone is a node. tor good for clearnet things, i2p good for in-network things. torrenting in i2p is good for i2p, not tor. torrenting in i2p stays in the i2p network, doesn’t go through exit nodes. there’s only about 3 of those. it’s torrenting as a darknet hidden service.
=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com
Yeah, thanks for clearing this up. I was also reading: https://geti2p.net/en/comparison/tor if people want to know more in depth.
=> More informations about this toot | More toots from melroy@kbin.melroy.org
After reading that whole page, I think your point is missing.. The use case of Tor and i2p isn't correctly explained on that site.
=> More informations about this toot | More toots from melroy@kbin.melroy.org
yeah some of the docs on the official site lean more technical than practical
=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com
I2P is P2P, TOR is not. That is the gist of the matter
=> More informations about this toot | More toots from Findmysec@infosec.pub
Does being a node open one to liability?
=> More informations about this toot | More toots from AlexWIWA@lemmy.ml
No, since they don’t act as exit nodes “they’re called outproxies in the I2P space”, unless you specifically configure that. It’s like running a Tor middle/guard relay. I2P was specifically designed that way, so everyone can use I2P and be a node by default without causing any trouble.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
Unless there’s a zero-day, no. All traffic is encrypted and it should be impossible to correlate traffic chunks to identities like that
=> More informations about this toot | More toots from Findmysec@infosec.pub
I tried to find the answer to this in i2p docs, maybe you would know more
As I understand, i2p traffic still needs to send packets over TCP/IP, so what stops the nodes you communicate with from knowing your IP? Its the only thing that makes me cagey about it since other p2p services like local game servers require sharing your IP to work. Hoping to get back into torrenting, thanks!
=> More informations about this toot | More toots from 8andage@sh.itjust.works
Here’s the scary sounding part that can be counterintuitive. The routers you’re communicating with do know your ip, since they have to like you mentioned. Your ip address is also in i2p’s DHT as a “router info” which functions as a network addressbook for routers and services so things can be found without needing a centralized lookup service. Again, because for the network to work, routers need to be able to find eachother, or they can’t communicate.
But, routers function on a need to know basis. i2p uses separate up and down links for each tunnel, and your side of the tunnel by default has 3 hops. other side usually also has 3 hops. typical unidirectional tunnel looks like this with total of 7 hops:
A-x-x-x=x-x-x-B
None of the chains in the link know what position they’re in (except for the endpoints). They also don’t know how long the whole tunnel is, since the sender and receiver only know their parts of the tunnel. On the dht side, by design no single router has a whole view of the network, but there isn’t a whole lot of information you get from that other than knowing that person at stated ip address uses i2p, which your isp would be able to tell for example anyway just like using tor or a vpn.
The way i made sense of it was like you have an envelope that is inside several other envelopes, with each envelope representing a layer of encryption. You get an envelope from kevin, so you know kevin. You open the envelope and see another envelope addressed to george, you give the envelope to him. So you know kevin and george. But the rest is unknown to you. You don’t know who the true originator of the envelope is or where the message is ultimately going.
=> More informations about this toot | More toots from sploodged@lemmy.dbzer0.com
So ip is only visible to the first/last hop, and they wouldnt know where youre going. That helps, thanks!
=> More informations about this toot | More toots from 8andage@sh.itjust.works
seed!!! I have already started my i2p setup and i will donate my bandwith
=> More informations about this toot | More toots from aida@lemm.ee
Does anyone know of a fairly uncomplicated method to set up my seedbox, so I can seed on the clearnet and I2P at the same time, without having to store two copies of all my torrents? I already seed terrabytes of torrent data, and I don’t want to store duplicates of all that.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
Unfortunately, Qbittorrent’s I2P support is still experimental. Assuming your seedbox provider can let you run BiglyBT or any other client that can cross-seed, all you have to do is add I2P trackers to your torrent file. You can also upload your torrent files to Postman on I2P for them to be registered.
=> More informations about this toot | More toots from Findmysec@infosec.pub
Thanks for the informative reply
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
I know nothing about seedboxes, but on a computer you can point multiple torrents to the same directory. If you make it read-only, by permission or mount options or whatever, the torrent client can’t even fuck it up
=> More informations about this toot | More toots from ReversalHatchery@beehaw.org
I know nothing about seedboxes
It’s basically just a cheap virtual server running e.g. Deluge or ruTorrent, hosted by a torrent-friendly provider in some country that doesn’t give a fuck about DMCA notices. Most don’t allow the user to access the underlying Linux system though, but mine does actually give me a root shell.
I’m gonna have to look into deploying another torrent client on the seedbox, besides my current ruTorrent installation. My provider also offers dedicated servers. They’re more expensive, but I might go with one so I can seed on the clearnet and I2P. It will probably have enough overhead CPU, RAM and bandwidth, so I can also run a Tor node and maybe IPFS.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
I’m assuming your seedbox providers allows you root access to the server? Which provider is this?
=> More informations about this toot | More toots from Findmysec@infosec.pub
I currently use GigaRapid, because they are one of the few providers that let me pay with Monero. If I find a better provider, I might switch though.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
Which plan? I used to use them too
=> More informations about this toot | More toots from Findmysec@infosec.pub
Currently on Iridium G10, I was on Gold G10 before, but ran out of storage. It’s pretty expensive though, and I’m open for better suggestions. I think the next one I’m gonna try out is AppBox. Unfortunately no XMR, but they offer other crypto currencies such as BTC, ETH, LTC, BCH and others. seedboxes.cc also seems interesting.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
I still have one of their ECO boxes but it’s not doing much. I haven’t torrented anything in the last 2 months I think (didn’t find a need to).
=> More informations about this toot | More toots from Findmysec@infosec.pub
Ok well the ECO boxes don’t really work as a seedbox, as they’re highly limited in bandwidth. Even if I don’t download anything, I still seed the torrent for others to download it. That’s the main purpose of a seedbox I guess. Since your ECO box only really acts as a downloader anyway, wouldn’t it be easier and cheaper to just get a VPN for downloading torrents, or a service like RealDebrid?
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
I do seed stuff (I downloaded a TV show of around 40GB last month and I’ve been seeding it since). It just keeps seeding at full speed till the time they throttle my bandwidth. Last I checked I was over 15 in ratio for that thing, but whatever.
I will eventually move to a VPS provider who doesn’t mind public torrents (I’ll pay through XMR). This seems like a much better idea since my needs have diversified and I’d like everything together on one machine to save costs. There’s other ways to use your seedbox too (without root access) and seed stuff that people really need/are deprived of (vague description on purpose).
=> More informations about this toot | More toots from Findmysec@infosec.pub
I will eventually move to a VPS provider who doesn’t mind public torrents
There aren’t many providers where this is the case, that’s why I’m looking into getting a cheap dedicated server from an actual seedbox provider. Some have them, e.g. RapidSeedbox and seedhost.eu. RapidSeedbox dedicated servers are really expensive though.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
Just find an unit with unmetered bandwidth, why do you need dedi?
=> More informations about this toot | More toots from Findmysec@infosec.pub
This was actually meant as a suggestion for you, since you mentioned that you want to put all of your stuff, including the seedbox, onto one single cloud server (hosted by a provider that allows this), so I recommended to just get a cheap dedicated server from an actual seedbox provider.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
Well, you’re right. If the provider I have in mind evaporates one day I’ll probably have to do that.
=> More informations about this toot | More toots from Findmysec@infosec.pub
Is there any reason why you can’t name the provider you have in mind? Perhaps in a DM?
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
If I say it here I might dox myself. I’d like for it to be a PGP conversation but I’m not quite there yet either (due to personal reasons). Sorry
=> More informations about this toot | More toots from Findmysec@infosec.pub
Would Matrix be fine? You can find my user name in my profile.
=> More informations about this toot | More toots from Andromxda@lemmy.dbzer0.com
=> More informations about this toot | More toots from oscardejarjayes@hexbear.net This content has been proxied by September (3851b).Proxy Information
text/gemini