I noticed this as well. I would text links to different people on iOS and they would never respond or acknowledge it. Dont know if it was a coincidence or not.
Watchman Privacy - The Monero Standard with Stoic.xmr
Gabriel Custodiet talks to Stoic.xmr (Michael Fitzgerald) about his book The Monero Standard. After covering some of the bare basics of money and the fiat system, they discuss the differences between the Bitcoin and Monero community and whether Bitcoin and Monero are even the point…
https://watchmanprivacy.com/2024/01/18/95-the-monero-standard-with-stoic-xmr/
The Monero Standard #89: Samourai Wallet's XMR<->BTC atomic swaps are now live in public beta; The IRS Bounty: The Full Story; share awesome-monero-guide with a beginner; and more...
If you are using #i2pd, you can mess with increasing tunnels and/or decreasing hops. This has helped decrease load times for me.
{inbound,outbound}.quantity = [1-16]
{inbound,outbound}.length = [1-8]
https://i2pd.readthedocs.io/en/latest/user-guide/tunnels/#i2cp-parameters
So it seems the Ubuntu package for #i2pd is borked...like, really borked. o.o Lots of issues reseeding...
Do any of you spot the issue as to why i2pd can not connect outwards? No outproxy is configured, for now anyway. It can't reach i2pd.xyz and possibly others.
---
# /lib/systemd/system/i2pd.service
[Unit]
Description=I2P Router written in C++
Documentation=man:i2pd(1) https://i2pd.readthedocs.io/en/latest/
After=network.target
ConditionFileIsExecutable=/usr/sbin/i2pd
[Service]
User=i2pd
Group=i2pd
RuntimeDirectory=i2pd
RuntimeDirectoryMode=0700
LogsDirectory=i2pd
LogsDirectoryMode=0700
Type=forking
Environment="DAEMON_OPTS=--conf=/etc/i2pd/i2pd.conf --tunconf=/etc/i2pd/tunnels.conf --tunnelsdir=/etc/i2pd/tunnels.conf.d --pidfile=/run/i2pd/i2pd.pid --logfile=/var/log/i2pd/i2pd.log --daemon --service"
EnvironmentFile=-/etc/default/i2pd
ExecStart=/usr/sbin/i2pd $DAEMON_OPTS
ExecReload=/bin/sh -c "kill -HUP $MAINPID"
PIDFile=/run/i2pd/i2pd.pid
### Uncomment, if auto restart needed
#Restart=on-failure
# Use SIGTERM to stop i2pd immediately.
# Some cleanup processes can delay stopping, so we set 30 seconds timeout and then SIGKILL i2pd.
KillSignal=SIGTERM
TimeoutStopSec=30s
SendSIGKILL=yes
# If you have the patience waiting 10 min on restarting/stopping it, uncomment this.
# i2pd stops accepting new tunnels and waits ~10 min while old ones do not die.
#KillSignal=SIGINT
#TimeoutStopSec=10m
# If you have problems with hanging i2pd, you can try increase this
LimitNOFILE=4096
# To enable write of coredump uncomment this
#LimitCORE=infinity
[Install]
WantedBy=multi-user.target
# /etc/systemd/system/i2pd.service.d/override.conf
[Service]
Restart=on-failure
---
Not sure what version is on Ubuntu repos, but maybe try the .deb from the PurpleI2P i2pd releases on GitHub
This! #i2p #i2pd
I have been wanting to put my whole network - no matter if windows, playstation, or synology nas - under the umbrella of a policy routing solution. So, I found Clash. Written in go and quite amazing! However, I never knew how to do transparent proxying...
After working with Gluetun for a little while for some services I run at home, I realized that Gluetun directly modifys it's networking stack and this then gets shared with other containers. Soooo... Clash would need to do the exact same to achieve this. Well, guess what; there is a Docker container that HAS the commands for a transparent proxy in it!
https://github.com/rinex20/clash-transparent-proxy-docker/blob/master/entrypoint.sh
Only thing is: I suck at iptables. xD Can someone explain th is one to me perhaps?
#devstr #asknostr #techstr
That script is adding a rule to route all packets marked with 0x1, and then the iptables rules are skipping all local traffic, and only tagging external traffic with 0x1 so that the ip rule will handle the routing.
Since CrowdSec is cuckblocking i2p to high heavens, I want to secure my SSH server before removing it, because I am not fond of all the random af traffic that goes there. So, I found this: https://github.com/skeeto/endlessh.git
Got any other hardening ideas? Aside from the obvious no password auth, no root login, pubkey auth only?
#asknostr
https://github.com/dev-sec/ansible-collection-hardening/tree/master/roles/os_hardening
You can steal snippets from this
I2P or i2pd? I suggest the i2pd app. Works much better for all my devices. Give it a shot.
#i2p is the Invisible Internet Project (I2P) which is a is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. geti2p.net or i2pd.website !
Also, this site provides a wealth of aggregated information on I2P: https://strict3443.codeberg.page/i2p-info/hugo/public/
Multiple alias numbers you can control: https://www.cloaked.app/
Otherwise the one-off SMS services:
Finally home...
Today I discovered Snipe-It - a selfhosteable inventory system. Well, I technically re-discovered it because I went with Homebox for my stuff here at... well, home. But Snipe-It might just land me a lovely project gig at my new place - SAML, OAuth, LDAP/AD... It can integrate into basically everything, it's crazy. And their mobile app looks pretty good! Really impressed by what I saw.
Meanwhile, I began checking out https://npmjs.com/nostr as the Nostr JS library of my choice for my upcoming projects. Small, got all the needed features and does exactly what a Nostr library needs to.
But then I looked at the multiaddr stuff on Github again, remembered it was made by the IPFS people, and just... Facedesked. The idea is that it is read by a human from left to right and tokenized that way. But programmatically, it's parsed right to left. Sounds easy enough; /ip4/127.0.0.1/tcp/80 reads fine. But, somewhere, someone, somehow thought it would be an amazing idea to make onion addresses work COMPLETELY differently X.x Because for that, you would do: /onion3/longhashthatgoeshereandrepsanonionaddress:PORT/tcp/80 - what?! x.x It's nowhere defined what said PORT even is! So I might end up using Multiaddr, but kindly correcting it's usage... And add i2p specs to it, because #i2p needs some love imho. Everyone be cutting onions, but where's the i2p folks at?? :D
Anyway - this was quite a day and I have a headache, am sleepy, am hungry, am coughing my lungs out close to another cold.
Time to eat and doomscroll untill I fall asleep. XD
+1 for #I2P
https://watchmanprivacy.com/2023/10/06/83-3d-printed-guns-and-death-athletic/
Gabriel Custodiet speaks with Jessica Solce, the director of Death Athletic, a documentary on 3D Gun printing and specifically on Cody Wilson and Defense Distributed. They discuss the erosion of the 2nd Amendment, the landscape of 3D gun printing, debanking, and other topics.
https://jramtech.gitlab.io/post/getting-over-cgnat-wireguard-gce/
Good article I've used as guidance. If you want a more hidden/private access to your setup, you could use I2P.
91 best privacy tools that can help you protect you at the internet. https://www.techlazy.com/best-privacy-tools/
Recommends LastPass... I'll pass.
Extreme Privacy What It Takes to Disappear - 4th Edition
https://inteltechniques.com/book7.html
Who HASN'T ready this book yet? Raise your hand.
#privacy #books
https://annas-archive.org/md5/3bca9891bf832a50e0f8d7aee7555eb3
Get it here. Repay him and his team by buying multiple copies of his smaller books to avoid Amazon payment system.
