Can we please Have a moment and talk about the current state of anonymization networks, and how to best fix it for any
metadata and leaks? What to tweak to make it more secure
As we all know TOR is glowing, created and funded by them. Maintained and directory nodes being owned by them, and probably
a majority of nodes. I thought I2p would be better so i just got into it. And started reading about its problems, and beef with devs.
Found following posts on some chans, and wanted some other peoples opinion..
So is it all always glowing? cant we have a network actually made by people for people?
——-
https://paste.coalserver.de/?5eb32f413de27fab#6QdH6kVtsR81E4tcXDfDkp13XQbFWNzsFkyqVx9TF9HE0x0.st/PZOy.txt
also what r the problems with networks like Lokinet, freenet, gnunet and yggradsil? except for the cheese pizza(tbh aint that hosted
by glowies themselves?)
So for TOR the securest way would be some laptop with libreboot, qubes and whonix. And for i2p/i2pd just changing your b32 adresses
and using new tunnels for every connection? what about the router id? that stays even after a reboot?
And how much of a pro is using a VPN paid with XMR before connecting to i2p and tor? its either the ISP sees the traffic,
or someone providing the proxys. I didnt fully get the part with i2p routers and ip adress correlation, but wouldnt a proxy solve that?
Also apparently, very poor information about how to correctly run i2p, being a floodfill router exposes your home IP and router ID
to the netDB to connect to other routers and support the network, the router ID being connected to the b32 adresses that the eepsites see.
So someone scraping netDB for floodfill routers, would be able to connect the routerID with the b32 adresses. and ur IP then.
whats this bullshit?
Also where else could i post this? lamdaplus /tech/ seems kinda active 4chan doesnt allow proxies.
any other spaces that are active?