How I Run Darknets From My Home Internet (Feds are SEETHING)

Поделиться
HTML-код
  • Опубликовано: 16 дек 2021
  • In this video I show you how I run different darknets (tor and i2p) from my home network.
    geti2p.net/en/comparison/tor
    github.com/PurpleI2P/i2pd
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
    Dash
    Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
    Zcash
    t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
    Chainlink
    0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
    Bitcoin Cash
    qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
    Etherum Classic
    0xeA641e59913960f578ad39A6B4d02051A5556BfC
    USD Coin
    0x0B045f743A693b225630862a3464B52fefE79FdB
    Subscribe to my RUclips channel goo.gl/9U10Wz
    and be sure to click that notification bell so you know when new videos are released.
  • НаукаНаука

Комментарии • 350

  • @winterland3253
    @winterland3253 2 года назад +2541

    mental outlaw has been providing such solid tutorials lately that I'm beginning to suspect he's a fed honeypot

    • @No-uc6fg
      @No-uc6fg 2 года назад +631

      What if the real honeypot were the friends we made along the way?

    • @nkonkonko
      @nkonkonko 2 года назад +184

      this is the hot fed they warned us about

    • @paulspl2581
      @paulspl2581 2 года назад +103

      That's why the videos of his face all look fake. They're all AI generated

    • @jamess1787
      @jamess1787 2 года назад +82

      Fed 100%.
      But a really cool glasses-wearing Chad. 🕶️🤳

    • @N.S.A.
      @N.S.A. 2 года назад +102

      I agree. 100% Fed.

  •  2 года назад +137

    Didn't expect to be peer pressured into running a tor node

  • @aetheralmeowstic2392
    @aetheralmeowstic2392 2 года назад +116

    You know what, the P2P online functionality of my planned Pokémon fan games will be run through I2P.

    • @eillee8394
      @eillee8394 5 месяцев назад +3

      Where is it!!!

  • @nnaaaaaa
    @nnaaaaaa 2 года назад +269

    i2p is stored in the balls.

  • @FoxMaccloud
    @FoxMaccloud 2 года назад +57

    Litterly just finished setting up a new tor relay on an old desktop from 2008 that I saved from the landfills xD

  • @idklol4197
    @idklol4197 2 года назад +759

    the virgin mental outlaw: i have darknets running on my own private server, my pc has custom coded lynooks kernel, and im behind 300 proxies.
    the chad CIA: haha how do i open pdf

    • @N.S.A.
      @N.S.A. 2 года назад +97

      😆

    • @purplep3466
      @purplep3466 2 года назад +24

      pin this comment, mr. Virgin Mental Outlaw

    • @spark198rus
      @spark198rus 2 года назад +19

      Lynooks LOL

    • @iselink
      @iselink 2 года назад +9

      Actualy this maybe is true as a lot of peoples don't know how to do basic tasks.

    • @cia3653
      @cia3653 2 года назад +28

      accurate

  • @hughjanus8003
    @hughjanus8003 2 года назад +285

    I love how a gentoo user says “arch btw” when using arch, but just seems to consider gentoo a normal thing

    • @gideonfelt2819
      @gideonfelt2819 2 года назад +21

      Did you know ChromeOS is Gentoo based too? Just an interesting fact.

    • @hughjanus8003
      @hughjanus8003 2 года назад +1

      @@gideonfelt2819 why?

    • @marcopeterson805
      @marcopeterson805 2 года назад +55

      @@hughjanus8003 gentoo is based

    • @totallynotbluu
      @totallynotbluu 2 года назад +1

      @@hughjanus8003 cause why not

    • @hughjanus8003
      @hughjanus8003 2 года назад +3

      @@totallynotbluu i meant it like why would gentoo be a better option for chrome os than other distros lmao

  • @RmFrZQ
    @RmFrZQ 2 года назад +89

    Now that TOR network is blocked in Russia by government, I2P network and self-hosted VPN service on VPS are the only options to fight against censorship.

    • @ZVLIAN
      @ZVLIAN 2 года назад +20

      Oh shit, Isnt russia like THE place for torrents, piracy and stuff?

    • @RmFrZQ
      @RmFrZQ 2 года назад +24

      @@ZVLIAN Well, yes and no. The famous and reputable torrent trackers were blocked by ISPs a few years ago, but just recently TOR networks were also blocked, because they were commonly used by people to fight against censorship enforcement and government surveillance. The torrent trackers are not going anywhere AFAIK for the rest of the world. TOR blockade just made more difficult to access them from Russia.

    • @nathanl2966
      @nathanl2966 2 года назад +5

      Don't forget IPFS.

    • @0xva
      @0xva 2 года назад +9

      Wouldn't tor bridges help with that?

    • @RmFrZQ
      @RmFrZQ 2 года назад +4

      @@SkyenNovaA yes, bridges work until they become individually blocked by ISPs. The process to get new bridges IPs is complicated, when you don't have access to Tor project website via "clear net".

  • @nkonkonko
    @nkonkonko 2 года назад +26

    DAD it's 4 in the morning and i'm here, ready lmfao

  • @Dobrouh
    @Dobrouh 2 года назад +12

    Kudos for the subtle "BTW I use Arch" that you snuck in there

  • @OGPimpin
    @OGPimpin 2 года назад +80

    Dude, you are a life saver. Ive been wanting to connect to i2pd for years, but was a bit skeptical based on how complicated it could get to set it up. Now its time to take care of business

    • @cagneybillingsley2165
      @cagneybillingsley2165 8 месяцев назад

      feds don't care because you're not doing anything that's really illegal or disruptive. they only care if there is physical tangible consequences to their monopolies on force, ideas, money, etc. ideas on the darknet are easily counteracted with tons of media propaganda

  • @c4llv07e
    @c4llv07e 2 года назад +9

    Yay! MO is talking about i2p and i2pd in general!

  • @LeDechaine
    @LeDechaine 2 года назад +37

    Thanks for this, I went from 26% ram use to 2.6% ram use by switching to i2pd!
    Also did not know about ssh tunneling, really helpful.

  • @ranaakhil
    @ranaakhil 2 года назад +56

    Thanks for the incredible guide.
    But thing about running relays at home is most ISPs now a days provide dynamic IPs which are behind Carrier Grade NATs and they don't allow port forwarding. :(

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 года назад +10

      True, but you can ask. Say that you are playing a new game and want to create a server and need port 4444 or whatever

    • @matthewsoules7064
      @matthewsoules7064 Год назад +7

      Say you wanna play a RuneScape private server...sounds cheesy as fuck but that's a very popular thing

  • @MrCrabs231
    @MrCrabs231 2 года назад +25

    "It's the deep web so you know that lain is gonna be posted everywhere"

  • @gideonfelt2819
    @gideonfelt2819 2 года назад +7

    This is awesome, wish it grows to tor level popularity.

  • @chrisjones2737
    @chrisjones2737 15 дней назад

    I just started college for computer science, I’m trying to understand the different buzz words and dark net was one. Good explanation

  • @Zerao98
    @Zerao98 2 года назад +128

    Correct me if I'm wrong but upnp can be a security vulnerability, why would you enable it? upnp should be off (already at the router).

    • @MentalOutlaw
      @MentalOutlaw  2 года назад +72

      afaik there were some insecure implementations of it on older router firmware, it would also make it easier for malware to spread to other devices if one becomes compromised.

    • @Zerao98
      @Zerao98 2 года назад +28

      @@MentalOutlaw
      Seems like something you wanna have off if you're going for security. I found this in one source (upguard), it says:
      To prevent such infectious connections from occurring, the entire attack surface associated with a UPnP connection must be kept updated with the latest patches. This includes routers, firewalls, antivirus software, and all IoT devices that are to be connected.

    • @surewhynot6259
      @surewhynot6259 2 года назад

      @@Zerao98 it's only a concern if unsecure programs open ports on it

    • @Zerao98
      @Zerao98 2 года назад +11

      @@surewhynot6259 someone might have a school or work laptop on the network, or just litterally any guest with wifi access. Any of those could lead a problem. There's literally no reason to enable upnp, if you go all the way tor/i2p kind of thing.

    • @w1z4rd9
      @w1z4rd9 2 года назад +1

      @@Zerao98 Oh that one where the Russians made the FBI warn the people of it.

  • @fatguybob2778
    @fatguybob2778 2 года назад +6

    Started college for Cybersecurity this year and I absolutely love this community! Woohoo info sec 4 life

  • @krypek940
    @krypek940 2 года назад

    best tech chanel + love your voice

  • @crepituss9381
    @crepituss9381 2 года назад +2

    I haven't used lynx for at least 15 years. Glad it's still around.

  • @xcat4775
    @xcat4775 2 года назад +1

    yikes ssh makes me nervous. Been thinking about running i2P lately though. Good to hear about it

  • @Anthony-cn8ll
    @Anthony-cn8ll 2 года назад +9

    The biggest thing that prevents hosting from home is assymetric speeds where you might get 1000 Mbps down but only 40 Mbps up. If you want any more then it has to be a prohibitively expensive business account. i2p is great because of the P2P structure, so hosting isn't as painful.

    • @dalethomasdewitt
      @dalethomasdewitt 2 года назад

      Advanced smrs were retrofitted to all metropolitan areas. Industry prospered: extreme bandwidth for cheap became the norm. AI controlled businesses allowed a new form of democracy. A bitcoin inexpensively powered ..
      .. allowed only the great things about nation states to replicate amounst the human civilization.

  • @TheBenSanders
    @TheBenSanders Год назад

    lmao switching to the terminal tab with the neofetch pulled up was really funny.

  • @metie10
    @metie10 2 года назад +4

    yo mental outlaw, can you make an indepth video about hosting a very safe and anonymous tor website. great vids

  • @wonyoung2523
    @wonyoung2523 2 года назад +2

    I got a US marine corps ad before this video started.

  • @wmdtone
    @wmdtone 2 года назад

    Very cool vid, thanks

  • @georgecaveington1661
    @georgecaveington1661 2 года назад +13

    It's safe to SSH tunnel over the internet because SSH is encrypted so the tunneled traffic will also be encrypted.

    • @curlybeckster288
      @curlybeckster288 2 года назад +7

      Yeah, this is what I was thinking. As long as I2P is configured to not allow connections to its web console using its public ip addresses, then it should be fine.

  • @SacGeoTV
    @SacGeoTV 2 года назад +25

    Gods Bless You - give em HELL 👹

  • @0x007A
    @0x007A 2 года назад

    To improve online safety from surveillance setup your own VPN service on a VPS, from there connect to another VPS hosting your I2P node and/or Tor middle or exit node.

  • @DoingFedTime
    @DoingFedTime Год назад +8

    As someone who was a darknet admin, vendor, and buyer - then fought the feds in court. The feds don't care it's a job for them.

  • @AJKvideoproductions
    @AJKvideoproductions 2 года назад

    Super useful video

  • @xtremememestv1717
    @xtremememestv1717 11 месяцев назад

    ur my hero bro

  • @24680kong
    @24680kong 2 года назад +1

    Thank you Based IT Guy.

  • @ebfromtha410
    @ebfromtha410 2 года назад +2

    Gotta love that pc name

  • @CaptZenPetabyte
    @CaptZenPetabyte 2 года назад +8

    If there were a way to make Tor exit nodes 'safer' then I am sure we could all just shove a docker container up, same for I2P... maybe that is the solution, so that if someone comes to mash it down a container would be easier to 'self destruct' and defunct the node?

    • @salpertia
      @salpertia 10 месяцев назад

      I know that the container exists but you look stupid deleting it only for them to know it came from your address.
      Not to mention your RUclips watch history confirms you are tech literate

  • @matthewgoodwin8206
    @matthewgoodwin8206 2 года назад +17

    Noob question: if in the Tor network each node is responsible for encrypting and decrypting the same layer of protection then that should mean that each decryption key is stored offline and only useable by the node responsible for that layer. However in the i2p network different servers are responsible for encryption and decryption. Does that mean that the encryption key has to be sent across the web to another server? This seems like a security vulnerability.

    • @radman4049
      @radman4049 Год назад +2

      Tor Network:
      In the Tor network, the traffic between nodes is encrypted in multiple layers (onion layers), and each node in the chain only decrypts one layer, revealing the next node's identity to which the traffic should be sent. This allows each node to only know about its immediate predecessor and successor, enhancing privacy. Each node is aware only of its part in the route, which is determined by the circuit established when the user connects to the network.
      I2P Network:
      In the I2P network, the routing is done differently. Instead of the onion routing used in Tor, I2P uses a "garlic routing" scheme. In garlic routing, messages are bundled together in garlic cloves, each with its own encryption layer. Each node removes one layer of encryption and then forwards the remaining clove to the next node. Unlike Tor, where each node knows only about its predecessor and successor, I2P nodes have knowledge of the entire route, making it different in terms of anonymity characteristics.
      In the case of I2P, because each node knows the entire route, it's true that the encryption key has to be sent across the network. However, the encryption keys are encrypted themselves, and multiple layers of encryption provide security. The nodes are trusted to properly forward the encrypted data without revealing the content.
      While the differences in encryption and routing between Tor and I2P have led to various discussions regarding their security properties, it's important to note that both networks have their own design philosophies and trade-offs. Both networks strive to provide anonymity and privacy for users, but their approaches and security models are distinct.
      Security vulnerabilities can exist in any system, and network design choices can impact the potential attack vectors. It's crucial for the developers of these networks to carefully consider security implications and continually improve their protocols based on the latest research and understanding of potential risks.

  • @electricz3045
    @electricz3045 2 года назад +6

    "i use arch btw" 🤣

  • @MageAtYou
    @MageAtYou Год назад

    How would you go on about setting up guerilla darknet exit route? Im thinking raspberry pi connected hidden somewhere connected to power and a local wifi. Thats the stuff tor needs!

  • @bin4rym4ge
    @bin4rym4ge Год назад +1

    Almost can't believe this actually works. Never knew you could port forward through ssh like that, super fun.
    God bless.

  • @Cookiekeks
    @Cookiekeks 2 года назад +2

    Can you please make a video about the Lokinet? It's another onion routing network, made by the devs of Session (private messenger).

  • @potentwater2260
    @potentwater2260 2 года назад +3

    Don’t understand anything, but enjoy the good content.

  • @foxtailedcritter
    @foxtailedcritter 2 года назад +1

    Just like McDonald's I'm Lovin' this.

  • @sillysausage231
    @sillysausage231 2 года назад

    I hecking love watching this with exactly zero idea what the fuck is going on :)

  • @NModem
    @NModem 2 года назад

    I got recommended this but don't know what it is, did a quick read, is it like seeding but for the Tor network?

  • @VivekYadav-ds8oz
    @VivekYadav-ds8oz 2 года назад +4

    Can anybody please explain why we don't have arbitrary no. of user-chosen proxies in either Tor or I2P? If we didn't select nodes as belonging to one of the three layers, but just general proxies, we can implement this. What's the programmatic/algorithmic/design difficulties that prevent this from being done?

    • @LiberOpine
      @LiberOpine 2 года назад

      I don’t think it’s possible to do without the nodes you are connecting to knowing how many relays deep you are which can be used to differentiate you from other users. In a predefined number of nodes, the first node knows that it will always send your data to an arbitrarily chosen second node and vice versa.

  • @mskiptr
    @mskiptr 2 года назад +19

    Why would tunneling some port over SSH be unsafe? I mean the point of these tunnels is to make it safe, isn't it?

    • @Zaptosis
      @Zaptosis 2 года назад +1

      ip

    • @hanelyp1
      @hanelyp1 2 года назад +5

      It would not be the ssh part that's a problem, but exposing the port to someplace it was not otherwise accessible.

    • @mskiptr
      @mskiptr 2 года назад +5

      @@hanelyp1 But the forwarded port is accessible only on the loopback interface

  • @chubbycatfish4573
    @chubbycatfish4573 2 года назад +5

    Kenny is the new Lain.

    • @magnusanderson6681
      @magnusanderson6681 2 года назад +1

      I need to watch this anime don't I
      It's actually pretty sad I've seen dozens of anime but none of the classics

    • @chubbycatfish4573
      @chubbycatfish4573 2 года назад +1

      @@magnusanderson6681 You should!

  • @astlari
    @astlari 2 года назад

    thanks

  • @TheCrowSpy
    @TheCrowSpy 2 года назад +9

    If I2P sends client functions also (kinda) as a router, wuoldn't it be easy to sinff relayed data?

    • @c4llv07e
      @c4llv07e 2 года назад +8

      It's complicated, but no. i2p was created with the idea that all transition nodes are compromised.

  • @DiegoLinde
    @DiegoLinde 2 года назад +3

    Can you cover Lokinet, please?

  • @noanyobiseniss7462
    @noanyobiseniss7462 2 года назад +1

    Bout time you got there.

  • @eddiehazard3340
    @eddiehazard3340 2 года назад +19

    Hi Mental Outlaw, I love your channel. I thought I'd suggest you might want to change the title of this one - if legislation changes and they decide you are doing something illegal, this title could be damning in a later trial. Thanks very much for all the info you give us. I gave you a thumbs-up/like !

    • @cleitonfelipe2092
      @cleitonfelipe2092 2 года назад +18

      BS. The date is previous to the supposed future law and it doesn't work retroactively to punish.

    • @eddiehazard3340
      @eddiehazard3340 2 года назад +15

      @@cleitonfelipe2092 You're insane. They look at peoples social media all the time to prove "intent". You're simply wrong.

    • @joeh6346
      @joeh6346 2 года назад +3

      ​@@eddiehazard3340 This needs to be decided, both comments have the same likes and I want to know what is the correct thinking here.

    • @FirstLast-fl7mo
      @FirstLast-fl7mo 2 года назад +1

      @@joeh6346 Social media aswell as local files will provide a very good insight into the mind of someone.

    • @Angel-yp6nl
      @Angel-yp6nl Год назад

      @@eddiehazard3340 with enough money, you can do anything

  • @pucktoad
    @pucktoad 2 года назад +1

    Have you considered a video on zeronet?

  • @triularity
    @triularity Год назад +1

    I'm not sure why ssh forwarding a port over the internet would be an issue. It's no less secure than ssh-ing into a server shell over the internet. Everything is [suppose to be] encrypted. 🤔

  • @guiAI
    @guiAI 2 года назад

    Why should i do this? Is there any benefit for me other than improving the network?

  • @ejonesss
    @ejonesss 2 года назад +9

    how safe are we on i2p since you act like a torrent and you become (possibly an exit node) from the feds?
    can the feds get you on the activity to certain web sites that are requested based on the urls despite the content being encrypted
    how good is your plausible deniability? (oh i dont know anything about the sites that you claim i am accessing)
    at least with tor you are NOT handling others traffic because by default the relaying and exit node is disabled so you should be safer on tor when visiting safer sites

    • @aryan_5271
      @aryan_5271 4 месяца назад

      The FEDs and the Government already know about this stuff, it's the common folk (who intrude into your privacy) that you need to guard against.

  • @qm3ster
    @qm3ster 2 года назад +1

    Is it really not possible to persist I2P state over a reboot?
    What about internet dropping out?

  • @barrdack
    @barrdack 2 года назад +8

    This channel is a honey pot :D

  • @Bhatakti_Hawas
    @Bhatakti_Hawas 2 года назад +6

    Plot Twist : Mental Outlaw works in the CIA

  • @electricman1884
    @electricman1884 2 года назад

    Is there any possibility to set up tor relay or i2p if i have router with mobile data without using vpn ?

  • @egg5474
    @egg5474 2 года назад

    Chief, do you mind telling me what you’re doing on board that Onion?

  • @semioval
    @semioval 2 года назад +15

    WHAT THE FUCK IS KERNEL AND HOW DO I UNINSTALL IT?!

    • @N.S.A.
      @N.S.A. 2 года назад +4

      There is a system32 folder on your computer
      Just leave it where it is.

    • @smayansahu1070
      @smayansahu1070 2 года назад +3

      sudo pacman -R linux

  • @user-in2jf7tx1q
    @user-in2jf7tx1q Месяц назад

    old classic little project to do after high school

  • @donnadie2068
    @donnadie2068 2 года назад

    What do you think about Zeronet?

  • @olokelo
    @olokelo 2 года назад

    Does anyone know what kind of network traffic speed should I be able to achieve as a i2p router?

  • @bubbleboy821
    @bubbleboy821 2 года назад +1

    Cover lokinet I can't believe you haven't done a video on it yet

  • @im1random263
    @im1random263 2 года назад

    Why use a ssh tunnel instead of just connecting to the local ip address of the pi?

  • @RusherDevelopment
    @RusherDevelopment 2 года назад

    Epic

  • @jonathanrealman8415
    @jonathanrealman8415 2 года назад

    I own a pfsense firewall, could I technically run the I2P router on that firewall?

  • @johannordstrom1932
    @johannordstrom1932 2 года назад

    GTFOGlowie is GOAT hostname

  • @donniedarko6432
    @donniedarko6432 Год назад

    can i use i2p on tails? and if yes how can i install the programm on the persistent volume?

  • @All3me1
    @All3me1 Год назад

    I did change that rule in the config but it stills says firewalled
    Should I change something in the router settings?

  • @lorenzo42p
    @lorenzo42p 2 года назад

    if you need a port forward, then set up a proper port forward in your router. I would never enable upnp

  • @kay_Z420
    @kay_Z420 11 месяцев назад

    Any good advice in creting a site eg. The html layout and where to go to get captchas set up

    • @sassycat77
      @sassycat77 10 месяцев назад

      Info like that is on google

  • @nathanfitzpatrick3152
    @nathanfitzpatrick3152 2 года назад

    can you run i2p on an openwrt or tomato router?

  • @stepannovotny4291
    @stepannovotny4291 Год назад

    The Java client does pass HTTPS but the i2pd not so much! I hope they fix that.

  • @FloFaber
    @FloFaber 2 года назад

    Why would you not tunnel certain ports over SSH? Nobody will see what's going thru the ssh tunnel anyway.

  • @destroyer2973
    @destroyer2973 Год назад

    You should check out freenet btw.

  • @pushkalsingh5603
    @pushkalsingh5603 2 года назад

    I AM HAVING DIFFICULTIES CONFIGURING I2P WITH MY TOR BROWSER ANY DETAILED GUID TO HELP OUT WITH THIS????

  • @AndrewWilson1991
    @AndrewWilson1991 2 года назад

    i can see the glow from here

  • @tedbybolf4616
    @tedbybolf4616 2 года назад +2

    Coreboot your thinkpad for more security.

  • @C1rnobyl
    @C1rnobyl 4 месяца назад

    Most people can't run a good Tor relay or I2P router at home unless they have fiber to the premises Internet. Upload bandwidth is a big issue.

  • @isbestlizard
    @isbestlizard 2 года назад

    I don't agree with your comment that you don't need to worry about https because i2p encrypts. Surely using http means that the site you're browsing, and any data you get/post to it, is sent in the clear over the internet and can be slurped up. Enforcing https means that only the destination web server can see that data, and hopefully (assuming they've not jumped into bed with the NSA) remains private.

  • @Ultrajamz
    @Ultrajamz 2 года назад +3

    I feel like soon either via new law or new interpretation of the law, they will make this a crime

  • @l_s2701
    @l_s2701 2 года назад +4

    Alright alright what's your iFunny

  • @NeverSaid-
    @NeverSaid- 2 года назад +5

    Someone should really be replicating some defi programs for the dark webs. Tor, i2p, freenet. Thats the only way to bypass KYC and access these programs long term. Crypto needs to go back to its roots.

  • @Flat_Erik
    @Flat_Erik 2 года назад

    you should have shown us the chan-memorial i2p xD... im pretty sure that there's only youtube friendly content on it

  • @kojitakamura2522
    @kojitakamura2522 2 года назад +2

    lokinet and freenet wen?

  • @polyesterbebe
    @polyesterbebe 2 года назад +1

    for the algorithm

  • @mushenji
    @mushenji 2 года назад +14

    Next; talk about distributed web 3. I already set up my tor middle node on a VPS. Next is to set up I2P.

  • @BallsDeep69_OwO
    @BallsDeep69_OwO 2 года назад +4

    Russian government yeeted all public relays into oblivion. Obfs4 bridges still run nicely here.

  • @pugnace9169
    @pugnace9169 2 года назад +2

    bro lokinet bro lokinet man

  • @nightking1863
    @nightking1863 2 года назад

    Please make a video on how to host a website on tor

  • @webcamArtificialIntelegence
    @webcamArtificialIntelegence Год назад

    Can invest on i2p

  • @greob
    @greob 2 года назад +6

    The Java implementation of i2p has a builtin torrent client, and some other neat stuffs (graphs, email client, etc.)

    • @thegrandnil764
      @thegrandnil764 2 года назад +25

      > java
      > builtin bloat
      why am i superized

    • @czumpi
      @czumpi 2 года назад +1

      cool

  • @battokizu
    @battokizu 2 года назад

    i2p chads rise up

  • @generalralph6291
    @generalralph6291 2 года назад +1

    Of course Lain is the mascot of the dark web! It’s obligatory!

  • @oskarzy1852
    @oskarzy1852 2 года назад

    yes

  • @enochrockwell7202
    @enochrockwell7202 2 года назад

    For some reason i'm reminded of when zeronet was a thing