NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Tor vs I2P Review

Tor and I2P are the main privacy routing networks that we have to hide IP addresses other than basic VPN connections. There are other projects too but they are either new or not that popular so they are less effective as anonymity scales by the number of users. I am going to give my honest opinion and compare the two:

✴️I2P Features:

βœ…Designed for hidden services which are faster and more efficent than Tor (1)
βœ…Distributed, P2P, decentralized and self organizing (2)
βœ…Packet switch instead of circuit switch, provides higher level of anonymity
βœ…Unidirectional tunnels, doubling the security / node than Tor
βœ…Tunnels are shorter lived than Tor
βœ…All peers participate in the network 🚩🚩 (3)
βœ…Bandwidth requirement is low
βœ…Built in Java 🚩🚩🚩🚩🚩🚩🚩🚩(4)
βœ…Free and Open Source

(1) I am not sure whether the onionv3 system would be more superior than this. While Tor wasn't designed for hidden services and it's just a plugin, with the onionv3 system it's getting there.

(2) Although it's much more decentralized than Tor, their claims are misleading. They still have directory servers and I guess the development team has a lot of power over the project, it's not like a blockhain which is fully decentralized, so this is misleading. Though it's more decentralized than Tor in either case.

(3) This makes I2P use very risky, especially connecting to it directly, as if somebody is doing something illegal, it would put every node there in danger and suspects of that same crime. Police I guess is not well experienced with this ,and due to the low user count ,this makes it very dangerous to use. Though connecting to I2P from Tor or from a VPN is less risky.

(4) Java is a very flawed language with a history security bugs, and the way the website mocks C in favor of Java makes them look ridiculous. This is a massive red flag for me.

✴️Tor Features:

βœ…More users hence bigger haystack of anonymity
βœ…More security audits and academic reviews on it
βœ…Has solved the scaling issue
βœ…Centralized 🚩🚩🚩🚩 (1)
βœ…Has more funding and workforce working on it
βœ…Is censorship resistant, it doesn't assume clear access to internet lik I2P (2)
βœ…Adaptive to DDOS attacks
βœ…Higher degree of plausible deniability and smaller risk of usage
βœ…Low usage of resources on clients but big usage on servers 🚩🚩 (3)
βœ…High bandwidth throughput reaching the throughput level of an average VPN service
βœ…Free and Open Source
βœ…Supposedly resistant to Sybil attacks (4)

(1) This is a big problem, the development and the infrastructure is very centralized, which would increase the risk of it being shutted down or censored, as it has a few points of failure. I think about 9 directory nodes exist now, which means that blocking only those 9 IP addresses worldwide would cripple the network. The use of bridges and proxies can help, but this issue needs to be addressed.

(2) While I2P assumes that you can connect to the internet, Tor assumes that you are censored, which is better. Tor has a bridge feature which allows to bypass any censorship other than total blocking of the internet. It can connect even through a HTTP proxy and it molds the traffic to be hard to distinguish from normal browsing by packet inspection. Though I2P can be used through Tor, so it's not a big drawdown, Tor still needs to do this, so perhaps the two systems complement eachother.

(3) It's balanced towards higher user experience by outsourcing the work to servers, but this increases centralization which is not good.

(4) It is supposedly resistant against Sybil by it's mechanism is picking trusted nodes, but due to it's centralized nature, operators could be coerced or coopted to become informants, so I don't think this works as well as advertised.

✴️Conclusion and more infos at: https://www.reddit.com/r/privacy/comments/8naaw8/tor_vs_i2p_review/
✴️ I2P Website: https://geti2p.net/en/
✴️ Tor Website: https://www.torproject.org/
✴️ Read in german language: https://t.me/cRyPtHoN_INFOSEC_DE/1678
#Tor #I2P #Review
I2P- Invisible Internet Project

Website: https://geti2p.net/en/

Setting up I2P: https://geti2p.net/en/about/media

Another Dark web browser I2P is quite different from Tor as it offers anonymity as it works with multiple layers of data streaming thus protecting your privacy.

This is strictly a message based on a library for reliable communications. Communications are end-to-end encrypted (four layers of encryption) with the cryptographic identifiers at the receiving end, which can be then decoded using public or private keys.

The Dark web browser framework works based on TCP/UDP or IP data transfer protocol. But to talk about Tor’s structure it isn’t that secured, because all it does is reroute your traffic via multiple nodes rather than connecting your physical device directly, so it does help in restricting tracking but do not mask your IP address.

I2P is based on the tunneling system, where the sender creates a tunnel for the outbound data and the receiver will already have created a tunnel for the inbound data, so the sender client will send his message through this outbound tunnel which will be received by the other client using the inbound tunnel and vice versa.

These tunnels are identified by requiring the same over a network database, which is more of a structured distributed hash table based on the kademelia algorithm. I2P is currently used to create an anonymous website using a standard web server and linking it with the I2PTunnel Server.

If you’re looking for anonymity over the web, and not ready to set up a VPN, then I2P is the one for you. So this is another best Dark web browser to stay anonymous.


#i2p
πŸ“‘@cRyPtHoN_INFOSEC_ES
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
Obscurix: Linux Live System for privacy, security and anonymity

#Obscurix is a new open source #Live operating system based on #Arch #Linux. Obscurix attaches great importance to your #privacy, #security and #anonymity on the net. The live operating system routes all your traffic quite securely through the #Tor# network and also supports many other networks like #I2P and #Freenet.

Privacy, Security and Anonymity
To get it straight up front: Obscurix does not want to be a Linux operating system for pentesters. Even if you mainly want to play games on your computer, you better find something else. Obscurix is simply a secure and easy to use live operating system. In addition, the developers have done a lot to make it resistant against various forms of tracking and #surveillance. As a user you don't have to configure much, which makes it easy to get started.

One of the big differences between this and other Linux operating systems is the special focus on privacy, security and anonymity. Therefore Obscurix is not an operating system that you should install on your hard disk. As a pure live operating system it runs only in the memory of your computer. During shutdown the #OS automatically deletes all digital "traces" that third parties could otherwise evaluate later.

Continue on:
https://tarnkappe.info/obscurix-linux-live-system-fuer-privatsphaere-sicherheit-und-anonymitaet/

πŸ‘‰πŸΌ Obscurix:
https://obscurix.github.io/

πŸ‘‰πŸΌ ObscurixOS TG support group:
https://t.me/Obscurix_OS

πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@BlackBox_Archiv
InviZible Pro

Telegram channel: @InviZiblePro

Telegram group: @InviZiblePro_Group

Wiki: https://github.com/Gedsh/InviZible/wiki

Download: https://github.com/Gedsh/InviZible/releases

invizible.net

InviZible Pro is an open-source android application. It can protect your internet privacy and security with well-known solutions such as DNSCrypt, Tor and Purple I2P which are used as modules. You can use them all together or activate only one or two at once. InviZible app combines its potential in the best way to achieve comfortable and secure use of the internet.

All application features can be used with root access which gives full control over your android device and power for InviZible to protect your information.

There is a way to use InviZible basic functions without root in combination with those applications that are available to create own local VPN tunnel or use a proxy. Something like NetGuard firewall, personalDNSfilter DNS filter proxy, Firefox browser, Telegram messenger.

InviZible can be used to block ads, malicious sites, and prevent your tracking. Also, you can get access to all blocked Internet resources, Dark Net (onion sites) and Invisible Internet (i2p sites). InviZible helps keep your freedom.

InviZible application is very flexible and can be used by everyone with the default setting. This is usually enough to protect your basic privacy and security. But if you want ultimate protection - no problem. You can configure many useful options to protect yourself better and smarter.

InviZible is compatible with the AfWall+ firewall.


πŸ“‘ @NoGoolag πŸ“‘ @Libreware
#invizible #dns #dnscypt #i2p #tor #privacy #android
By default anyone using i2p is a node for transition of data to other peers, and it was built with torrenting in mind

https://i2pd.website

https://geti2p.net

#i2p #p2p
Meshtastic (An inexpensive open source GPS mesh radio for hiking, skiing, flying, walking).

https://meshtastic.org
An open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices

Radio Mesh text messaging
Off-grid messaging using low-cost hardware to create your own personal mesh. Radios transmit messages to the next to flood the network. Communicate kilometers/miles between nodes. Internet-connected relay nodes also allow the conversation to move online.


Video @libreware
LoRaWAN - Wikipedia -
F-Droid app :
https://f-droid.org/packages/com.geeksville.mesh/

#Meshtastic
#MeshNetwork #Radio #RF #LoRa #LoRaWan #I2p #Mesh
#DecentralizedNetwork #MeshNetwork