[REQ_ERR: COULDNT_RESOLVE_HOST] [KTrafficClient] Something is wrong. Enable debug mode to see the reason.[REQ_ERR: COULDNT_RESOLVE_HOST] [KTrafficClient] Something is wrong. Enable debug mode to see the reason.[REQ_ERR: COULDNT_RESOLVE_HOST] [KTrafficClient] Something is wrong. Enable debug mode to see the reason.[REQ_ERR: COULDNT_RESOLVE_HOST] [KTrafficClient] Something is wrong. Enable debug mode to see the reason.
Поэтому при использовании поисковика, нужно крайне осторожно выбирать ресурсы. Коду на Lua предоставляется широкий круг возможностей, в том числе манипуляции с сокетами прямого доступа. Трудно понять, кто там стоит за кулисами каждого сайта. Пользуясь not Evil вы сможете значительно сэкономить свое время и сохранить полную анонимность. Читайте еще : Что будет, если долго не снимать пенсию с карты: могут ли заблокировать карту.
For the utmost security and anonymity on both Tor and I2P, set the security slider to the maximum level, which disables a number of features in favour of security at the cost of usability, such as Javascript. Alternatively, select whichever setting you are most comfortable with I find Medium-High to be a good compromise. Another quick security consideration to be aware of is that with this setup you are relying on both the anonymity of Tor and I2P. If either is broken, you are at risk of being deanonymized, which could be of little consequence, or of life-altering consequence.
If your threat model is towards the latter, this configuration may not be for you. Instead, a dedicated browser that only connects to I2P not Tor will be the more secure choice. However, that is outside the scope of this tutorial. Why The Tor Browser? Security Considerations While you could start browsing right now, there is one last optional modification you may wish to make. Follow On Twitter. Follow On Facebook. About Contact Privacy Policy Note: This site is no longer maintained and is kept online for archival purposes only.
Although this is the easiest method, on the downside end-to-end encryption is lost when connecting to the eepsites. Further, potentially Tor Exit Nodes can Eavesdrop on Communications if an inproxy uses plain http, since it is an unencrypted connection. This risk is averted if the inproxy uses http s or is reachable via an onion service. In any case, the I2P inproxy administrator can see all of your traffic in the I2P network and it is impossible to prevent that.
Before configuring this tunnel link, it is recommended to read the following related wiki entries for general educational purposes on tunnel links. There is no need to apply any instructions from these wiki entries.
Note :. Security warning: Adding a third party repository allows the vendor to replace any package on your system. Proceed at your own risk! See Foreign Sources for further information. Had broken connectivity for some users in past. Probably fixed by now. Add the I2P signing key.
Securely download the key. If you are using a Qubes Template whonix-ws , run. Digital signatures can increase security but this requires knowledge. Learn more about digital software signature verification. The most important check is confirming the key fingerprint exactly matches the output below. Do not continue if the fingerprint does not match -- this risks using infected or erroneous files! The whole point of verification is to confirm file integrity.
Copy the signing key to the APT keyring folder. Update the package lists and upgrade the system. Using apt command line parameter --no-install-recommends is in most cases optional. Configure Tor Browser to allow connections to I2P. Before using I2P, it is recommended to access the I2P router configuration and make several adjustments for better performance.
This box uses sudoedit for better security. This is an example and other tools can also achieve the same goal. Change I2Pconsole interface local IP change. Restart I2P. The I2P supported applications webpage warns that no guarantee can be provided about the safety of compatible applications, plugins and services -- they must be properly configured and might jeopardize anonymity due to design faults or carelessness.
Carefully vet these tools and research them diligently beforehand. Many interesting features and functionality are implemented for I2P in the form of stand-alone packages or plugins that can be optionally installed from their official plugin eepsite. Various tools are available for:. The instructions are simple to follow. The signing keys for these plugins are already built into the official I2P package and so are already white-listed.
This is not a complete list. For documentation about default port numbers of I2P plugins, see this page. I2P-Bote is a serverless, encrypted email plugin that uses I2P for anonymity. Messages are stored in the distributed hash table DHT for days, during which the recipient is able to download them.
Generally speaking, applications that run with a browser interface are vulnerable to a whole class of bugs, including cross-site request forgery CSRF. It can be used as an alternative to Syndie see further below and can be tunneled through I2P for enhanced anonymity.
Follow the steps in this guide to connect to others over I2P. To install RetroShare, see: Installation. Syncthing is a popular libre software for file syncing based on the bittorrent protocol. It is possible to tunnel Syncthing traffic over I2P as shown in this guide. It supports single and multiple author modes, adjustable visibility of posts and post moderation. Syndie features its own minimalist and secure reader to protect against browser exploitation.
In , Syndie was being rewritten in another programming language to provide a more modern and simple interface, along with basic image rendering. A key benefit of Syndie is that unlike centralized forums, it cannot be easily taken offline via denial of service attacks or administrative action, and there is no single point to monitor group activity.
In addition to simple text messages, entire webpages or the full content of sites can be packaged into a single post, which can even be browsed offline. The Syndie Technical Features section notes: [29]. There are no dependencies upon how the files are transferred over I2P , Tor , Freenet , gnutella , bittorrent , RSS , usenet , email , but simple aggregation and distribution tools will be bundled with the standard Syndie release.
Unfortunately, I2P is not yet natively supported as a tunneling option in ZeroNet. No real progress has been made towards this goal for years; see footnotes to follow developments.