I was curious about ZeroNet again today. ZeroNet was a #P2P web project from the 2010s along similar lines to I2P (https://en.wikipedia.org/wiki/I2P) and #Tor hidden services. The idea of hosting dynamic webpages in a completely P2P fashion, like torrents, remains super cool and appealing to me. In fact, at one point the #BitTorrent company had a similar proposal (https://www.bittorrent.com/blog/2014/12/10/project-maelstrom-the-internet-we-build-next/).
The ZeroNet website (https://zeronet.io/) is still up, but the project hasn't been updated in five years as per the GitHub repo (https://github.com/HelloZeroNet/ZeroNet). Someone was maintaining a fork at some point, and at other times I heard that ZeroNet was (now?) insecure, although I know no details. Certainly anything P2P isn't anonymous by default.
I found this question (https://github.com/HelloZeroNet/ZeroNet/issues/2749) about the creator of ZeroNet. Disturbingly, this article (https://www.newsbtc.com/news/sam-maloney-creator-of-morphis-and-dpush-shot-dead-by-london-police/) about a different developer killed by the police under unusual circumstances was shared.
My impression was that ZeroNet actually worked (works?) to some extent. Why aren't projects like this being funded? We need censorship-resistant ways of communicating online, after all.
I find networking tech fascinating, and I like overlay networks. I've recently found out about #I2P and it seems interesting but I'm not quite sure what a typical use case is. Anyone on the Fediverse want to enlighten me as to how they personally use it?
Разработка скрипта для распознавания капчи Cloudflare
https://habr.com/ru/articles/892986/
Я понимаю, что иногда Cloudflare используют, чтобы скрыть настоящий #IP-адрес сайта. Или чтобы сайт, у которого нет #IPv4-адреса, был доступен и тем пользователям, у которых в 2025 году почему-то всё ещё нет #IPv6. Было бы лучше, если бы каждый сайт за Cloudflare был доступен также в скрытосетях: #Tor #onion, #I2P.
Privacy shouldn't require a PhD. Magic Grants just released 4 powerful privacy apps for TrueNAS Scale that let you run your own Monero node, I2P, and Tor infrastructure with a few clicks. https://youtu.be/mfO1oh2Fvgw
#tor #i2p #truenas #monero
Anonymity in #P2P networks? Why not? Overlay networks like #I2P protect user privacy, preventing surveillance and reducing the risks of censorship. But they’re slower due to encryption and complex routing.
#divaexchange
RetroShare is a free, cross-platform software for serverless communication, including letters, instant messages, and file exchanges over an encrypted F2F/P2P network. This network is built on GPG algorithms and the Perfect Forward Secrecy protocol.
What is RetroShare?
RetroShare is part of the darknet class of networks, where connections and data exchanges are limited to a specific group of participants, excluding external contacts. In this network, participants' IP addresses are hidden from each other, except within a trusted circle.
Instead of using IP addresses for packet addressing, RetroShare employs a 128-bit random identifier—an anonymous ID. This makes it nearly impossible to determine the IP addresses of participants, even within a user's close network. In essence, monitoring file-sharing or communication activities is exceedingly difficult, and determining the number of participants in the dark network is non-trivial.
Key Features of Dark Networks
Dark networks like RetroShare share two important characteristics:
Difficult Monitoring: It's hard for external parties to monitor user activities, as they are not connected to the network.
Invisible Connectivity: It is impossible to know whether a user is connected to such a network from outside the immediate environment, making RetroShare hard to detect.
This distinguishes dark (private) anonymous networks from public anonymous networks, where participants' IP addresses can be observed directly or indirectly. Furthermore, connecting to an arbitrary node in RetroShare requires confirmation from the counterpart, which adds an extra layer of privacy.
A Simple Guide to Connecting to RetroShare
This article is for those who want to quickly connect to the RetroShare network without delving into the complexities of accessing it via Tor or I2P. Here's a simple guide to getting started with RetroShare:
Download and Install the Client Program
Visit the official RetroShare website: retroshare.net.
RetroShare is cross-platform, which means it supports various operating systems, including mobile ones! Linux users can build from source, but for simplicity, we’ll use an AppImage.
Set Up the Program
It's recommended to route all traffic through a VPN for added security. Leave it enabled for the duration of RetroShare’s usage. If you’re communicating only with trusted individuals (e.g., family), it’s not critical.
Download the AppImage here: RetroShare AppImage.
Make the file executable by right-clicking and enabling the "Allow execution of the file as a program" option.
Open a terminal and navigate to the file's location: /root/RetroShare-0.6.4.20180313.0e6d27ad-x86_64.AppImage.
RetroShare will launch, and a new profile creation window will appear. Before proceeding, click on “Options” in the top-right corner.
Configure Your Profile
Fill in the following fields:
Name
Device Name
Password (and confirm)
Chat Name
Encryption Key (be sure to set it to 4096 bits)
Node Settings (leave as default)
Entropy (wait until the bar is full)
Once done, click "Let’s Get Started." RetroShare will generate your certificate, which can be shared via closed channels or in person. You can then request and add the certificate of the person you're communicating with.
Network Settings
Before diving into the network, it’s essential to modify some default settings:
Expand the service data exchange channel and increase the number of tunnels available to other users.
Higher values mean you contribute more to the network by handling both your own and transit traffic from other users. The default is set for a 20 Mbit/s network speed, but you can increase it based on your actual connection speed.
Check the “Use relay servers” box if you have a restrictive router or firewall. This ensures easier access to the network.
Set the destination folder for downloaded files to avoid confusion later. By default, files are saved in a hidden directory like: /root/.retroshare/LOC06_c098e80721a7d1685271211cbe361c03/Downloads.
Finding Trusted Peers
If you don’t have friends using RetroShare but wish to join the dark network, finding trusted peers can be challenging. However, RetroShare now makes this process easier. You can find trusted peers in the built-in chat by exchanging certificates with other users or robots on websites like retroshare.ch.
Enter your certificate in the provided window, press "Submit," and obtain the server certificate. Copy it and add it to your RetroShare certificate list.
Connecting and Building Your Network
Once connected, RetroShare will notify you, and the first node will appear in your list. You can set the trust level for each node according to your discretion.
RetroShare’s Features
Now that you're connected, RetroShare offers a wide range of services:
Contact List
Chat
Post Office
File Sharing
Channels
Forum
Publications
Unlike regular networks, RetroShare keeps the connection details of users within your trusted environment hidden from others in the network. Only those within your immediate network can know you’re connected to RetroShare.
Enhancements with Tor Network Integration
Starting from RetroShare version 0.6, the platform integrates with the Tor network for added privacy. As long as Tor is reliable, RetroShare remains secure, even if the user’s exchange of certificates is disorganized or the settings are unconventional.
The Dark Network and the Role of Authorities
Anyone who exchanges their personal certificate with a RetroShare node becomes a full-fledged member of the dark web and can receive data from anonymous sources. Interestingly, a representative from a punitive or detective agency, after exchanging certificates with two or more nodes, can become a transit point for encrypted data across the network, without knowing the source or destination. This ensures that even law enforcement, while helping grow the network, cannot trace the traffic.
Final Thoughts
Take care of yourself, user! This article is purely informational and does not advocate for any particular actions. The author holds no responsibility, as the ideas presented here are hypothetical, with all coincidences to real events or names being purely accidental.
Author: Telegram Channel @ZapiskiLizermana (Lizerman's Notes)
Швейцарский нож среди мессенджеров
https://omimedia.blogspot.com/2025/03/blog-post.html
#RetroShare #Darknet #Privacy #Security #Encryption #P2P #Anonymous #SafeChat #OpenSource #DigitalPrivacy #CryptoNetwork #MessagingApp #FileSharing #TechForPrivacy #Tor #I2P #PeerToPeer #EncryptedNetwork #Decentralized #PrivateComms #SecureFiles #AnonymousMessaging #DataPrivacy #RetroShareGuide
Кто-нибудь использует #DeltaChat в #i2p ? Или это извращение?
Finally got the "fingerless gloves" upgrade on Reticulum. (i.e. we now have our name in big text)
Networks I've started a node on:
#yggdrasil
#Reticulum
Networks I still need to operate a node on:
#tor
#i2p
Cool stuff I'm interested in:
#meshtastic (Cuz in case of a tornado hits here and we lose power/phone)
#hamradio (Community)
Memento Mori.
Ich habe mich auf dieser Instanz noch nicht vorgestellt, also werde ich das mal nachholen. - Mit #Hashtags.
Ich bin #Schnur, #Fedihopper von #techlgbt (Alt Acc @Schnur@tech.lgbt).
Meine Hauptmerkmale sind mMn nach, dass ich #suizidal-#soziopathisch bin. Seid bei meinem Account also bitte vorgewarnt, ich versuche möglichst #offen zu sein.
Meine Interessen sind #Gaming (wenn ich nicht so #depressiv wäre...). #OpenSource-Software und Politik.
Meine favorisierten Betriebssysteme sind #GrapheneOS und #QubesOS [Meme: https://forum.qubes-os.org/uploads/db3820/original/2X/4/479bab8c13822ee83d03d084d4ae259a0666f65b.jpeg] und ich bin ein #Darkweb(#Tor & #I2P)-Enjoyer.
Wenn ihr mich kontaktieren wollt: Meine Privatnachrichten sind offen und wenn ihr #e2e-verschlüsselte Kommunikation bevorzugt, nutze ich #Signal (#Molly-Client), #Briar und #SimpleX.
Last but not least: Meine politische Einstellung.
Ich bin überzeugter #Europäer und deswegen Parteimitglied bei #Volt.
Bitte... Wählt am Sonntag #europäisch und #gegenrechts, jede Wahl muss eine #Klimawahl sein. Danke...
PS: Weil gerade die #AroVisiblityWeek stattfindet, möchte ich kundtun, dass ich #AroAce bin! UwU
If you #I2P I will be at #Rightscon next week to talk about all things transports, networks, building digital resistance and encryption! Also, how internet fragmentation is a much broader and nuanced topic than how it is being presented.
I will have toopie stickers, friendship bracelets and will be so happy to have all the conversations and tea!
Fun fact
You can run Syncthing over I2p
Why
No NAT
100% self hosted
No traceable connection between hosts
You get to run two I2P nodes
You don’t have to trust Syncthing relay servers with anything
More cover traffic for I2P
Here's a guide I found
https://web.archive.org/web/20171008035012/https://barry.im/post/2017/10/6/syncthing-over-i2p/
Now we just need a Rust router
Request for testing is2fp: https://www.reddit.com/r/i2p/comments/1ins8xk/is2fp/