mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 75.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,7K
utenti attivi

#i2p

7 post6 partecipanti0 post oggi

I was curious about ZeroNet again today. ZeroNet was a #P2P web project from the 2010s along similar lines to I2P (en.wikipedia.org/wiki/I2P) and #Tor hidden services. The idea of hosting dynamic webpages in a completely P2P fashion, like torrents, remains super cool and appealing to me. In fact, at one point the #BitTorrent company had a similar proposal (bittorrent.com/blog/2014/12/10).

The ZeroNet website (zeronet.io/) is still up, but the project hasn't been updated in five years as per the GitHub repo (github.com/HelloZeroNet/ZeroNe). Someone was maintaining a fork at some point, and at other times I heard that ZeroNet was (now?) insecure, although I know no details. Certainly anything P2P isn't anonymous by default.

I found this question (github.com/HelloZeroNet/ZeroNe) about the creator of ZeroNet. Disturbingly, this article (newsbtc.com/news/sam-maloney-c) about a different developer killed by the police under unusual circumstances was shared.

My impression was that ZeroNet actually worked (works?) to some extent. Why aren't projects like this being funded? We need censorship-resistant ways of communicating online, after all.

en.wikipedia.orgI2P - Wikipedia

I find networking tech fascinating, and I like overlay networks. I've recently found out about #I2P and it seems interesting but I'm not quite sure what a typical use case is. Anyone on the Fediverse want to enlighten me as to how they personally use it?

Разработка скрипта для распознавания капчи Cloudflare
habr.com/ru/articles/892986/

Я понимаю, что иногда Cloudflare используют, чтобы скрыть настоящий #IP-адрес сайта. Или чтобы сайт, у которого нет #IPv4-адреса, был доступен и тем пользователям, у которых в 2025 году почему-то всё ещё нет #IPv6. Было бы лучше, если бы каждый сайт за Cloudflare был доступен также в скрытосетях: #Tor #onion, #I2P.

#captcha #капча #Cloudflare @rf @russian_mastodon @ru

ХабрKак обойти капчу Сloudflare Turnsile — или обход Cloudflare разной степени сложностиВ рамках научного и исследовательского интереса решил поэкспериментировать с распознаванием сложных типов капчи, ну как поэкспериментировать - скорее проверить работоспособность и умение электронного...

RetroShare is a free, cross-platform software for serverless communication, including letters, instant messages, and file exchanges over an encrypted F2F/P2P network. This network is built on GPG algorithms and the Perfect Forward Secrecy protocol.

bastyon.com/post?s=5b8ca60211e

What is RetroShare?
RetroShare is part of the darknet class of networks, where connections and data exchanges are limited to a specific group of participants, excluding external contacts. In this network, participants' IP addresses are hidden from each other, except within a trusted circle.
Instead of using IP addresses for packet addressing, RetroShare employs a 128-bit random identifier—an anonymous ID. This makes it nearly impossible to determine the IP addresses of participants, even within a user's close network. In essence, monitoring file-sharing or communication activities is exceedingly difficult, and determining the number of participants in the dark network is non-trivial.
Key Features of Dark Networks
Dark networks like RetroShare share two important characteristics:
Difficult Monitoring: It's hard for external parties to monitor user activities, as they are not connected to the network.
Invisible Connectivity: It is impossible to know whether a user is connected to such a network from outside the immediate environment, making RetroShare hard to detect.
This distinguishes dark (private) anonymous networks from public anonymous networks, where participants' IP addresses can be observed directly or indirectly. Furthermore, connecting to an arbitrary node in RetroShare requires confirmation from the counterpart, which adds an extra layer of privacy.
A Simple Guide to Connecting to RetroShare
This article is for those who want to quickly connect to the RetroShare network without delving into the complexities of accessing it via Tor or I2P. Here's a simple guide to getting started with RetroShare:
Download and Install the Client Program
Visit the official RetroShare website: retroshare.net.
RetroShare is cross-platform, which means it supports various operating systems, including mobile ones! Linux users can build from source, but for simplicity, we’ll use an AppImage.
Set Up the Program
It's recommended to route all traffic through a VPN for added security. Leave it enabled for the duration of RetroShare’s usage. If you’re communicating only with trusted individuals (e.g., family), it’s not critical.
Download the AppImage here: RetroShare AppImage.
Make the file executable by right-clicking and enabling the "Allow execution of the file as a program" option.
Open a terminal and navigate to the file's location: /root/RetroShare-0.6.4.20180313.0e6d27ad-x86_64.AppImage.
RetroShare will launch, and a new profile creation window will appear. Before proceeding, click on “Options” in the top-right corner.
Configure Your Profile
Fill in the following fields:
Name
Device Name
Password (and confirm)
Chat Name
Encryption Key (be sure to set it to 4096 bits)
Node Settings (leave as default)
Entropy (wait until the bar is full)
Once done, click "Let’s Get Started." RetroShare will generate your certificate, which can be shared via closed channels or in person. You can then request and add the certificate of the person you're communicating with.
Network Settings
Before diving into the network, it’s essential to modify some default settings:
Expand the service data exchange channel and increase the number of tunnels available to other users.
Higher values mean you contribute more to the network by handling both your own and transit traffic from other users. The default is set for a 20 Mbit/s network speed, but you can increase it based on your actual connection speed.
Check the “Use relay servers” box if you have a restrictive router or firewall. This ensures easier access to the network.
Set the destination folder for downloaded files to avoid confusion later. By default, files are saved in a hidden directory like: /root/.retroshare/LOC06_c098e80721a7d1685271211cbe361c03/Downloads.
Finding Trusted Peers
If you don’t have friends using RetroShare but wish to join the dark network, finding trusted peers can be challenging. However, RetroShare now makes this process easier. You can find trusted peers in the built-in chat by exchanging certificates with other users or robots on websites like retroshare.ch.
Enter your certificate in the provided window, press "Submit," and obtain the server certificate. Copy it and add it to your RetroShare certificate list.
Connecting and Building Your Network
Once connected, RetroShare will notify you, and the first node will appear in your list. You can set the trust level for each node according to your discretion.
RetroShare’s Features
Now that you're connected, RetroShare offers a wide range of services:
Contact List
Chat
Post Office
File Sharing
Channels
Forum
Publications
Unlike regular networks, RetroShare keeps the connection details of users within your trusted environment hidden from others in the network. Only those within your immediate network can know you’re connected to RetroShare.
Enhancements with Tor Network Integration
Starting from RetroShare version 0.6, the platform integrates with the Tor network for added privacy. As long as Tor is reliable, RetroShare remains secure, even if the user’s exchange of certificates is disorganized or the settings are unconventional.
The Dark Network and the Role of Authorities
Anyone who exchanges their personal certificate with a RetroShare node becomes a full-fledged member of the dark web and can receive data from anonymous sources. Interestingly, a representative from a punitive or detective agency, after exchanging certificates with two or more nodes, can become a transit point for encrypted data across the network, without knowing the source or destination. This ensures that even law enforcement, while helping grow the network, cannot trace the traffic.
Final Thoughts
Take care of yourself, user! This article is purely informational and does not advocate for any particular actions. The author holds no responsibility, as the ideas presented here are hypothetical, with all coincidences to real events or names being purely accidental.
Author: Telegram Channel @ZapiskiLizermana (Lizerman's Notes)
Швейцарский нож среди мессенджеров
omimedia.blogspot.com/2025/03/
#RetroShare #Darknet #Privacy #Security #Encryption #P2P #Anonymous #SafeChat #OpenSource #DigitalPrivacy #CryptoNetwork #MessagingApp #FileSharing #TechForPrivacy #Tor #I2P #PeerToPeer #EncryptedNetwork #Decentralized #PrivateComms #SecureFiles #AnonymousMessaging #DataPrivacy #RetroShareGuide

Memento Mori.

Ich habe mich auf dieser Instanz noch nicht vorgestellt, also werde ich das mal nachholen. - Mit #Hashtags.

Ich bin #Schnur, #Fedihopper von #techlgbt (Alt Acc @Schnur@tech.lgbt).

Meine Hauptmerkmale sind mMn nach, dass ich #suizidal-#soziopathisch bin. Seid bei meinem Account also bitte vorgewarnt, ich versuche möglichst #offen zu sein.

Meine Interessen sind #Gaming (wenn ich nicht so #depressiv wäre...). #OpenSource-Software und Politik.

Meine favorisierten Betriebssysteme sind #GrapheneOS und #QubesOS [Meme: forum.qubes-os.org/uploads/db3] und ich bin ein #Darkweb(#Tor & #I2P)-Enjoyer.

Wenn ihr mich kontaktieren wollt: Meine Privatnachrichten sind offen und wenn ihr #e2e-verschlüsselte Kommunikation bevorzugt, nutze ich #Signal (#Molly-Client), #Briar und #SimpleX.

Last but not least: Meine politische Einstellung.
Ich bin überzeugter #Europäer und deswegen Parteimitglied bei #Volt.
Bitte... Wählt am Sonntag #europäisch und #gegenrechts, jede Wahl muss eine #Klimawahl sein. Danke...

PS: Weil gerade die #AroVisiblityWeek stattfindet, möchte ich kundtun, dass ich #AroAce bin! UwU

If you ❤️ #I2P I will be at #Rightscon next week to talk about all things transports, networks, building digital resistance and encryption! Also, how internet fragmentation is a much broader and nuanced topic than how it is being presented.
I will have toopie stickers, friendship bracelets and will be so happy to have all the conversations and tea!

Ha risposto nella discussione
@dalias @lauren @monocles @signalapp @kkarhan @pixelschubsi Not that either #Tor or #Veilid (or #I2P, for the closest similar network by design) are really all that resilient to malicious global observers with malicious nodes running timing analysis.

Batching, delays and cover traffic are varying degrees of unimplemented in all of those.

(And of course, even when implemented long-running always-available/low-latency services are subject to deanonymization by active interference and passive observation of downtime correlated with power outages & natural disasters.)
@geo @madeindex Freenet/Hyphanet's opennet mode is fundamentally broken (https://en.wikipedia.org/wiki/Hyphanet#Vulnerabilities) and the project plainly admits it too (https://www.hyphanet.org/pages/help.html#wont-attack-x-break-hyphanets-anonymity) (onion/garlic routing and cover traffic would help).

Correlation attacks are pretty much the death knell for opennet and darknet mode has unreasonable trust requirements.

As for #I2P, it does have some cover traffic in a way, with its mixing tunnels. It'd be nice if the batching & delay TODO work was done though.

#Freenet #Hyphanet
en.wikipedia.orgHyphanet - Wikipedia