Author Topic: Hey everyone, lets learn to I2P before it goes mainstream and uncool.  (Read 681 times)

ALoudOwl

  • Newbie
  • *
  • Posts: 20
  • Karma: +2/-1
    • View Profile
    • Personal Message (Offline)
Step 1: Download I2P http://www.i2p2.de/download.html
If your on windows, choose the first "windows graphics installer." Install. Now, navigate to where ever you installed it to, and open "start I2P (restartable)" Command prompt should come up, do some computer stuff, and then it should open ***Your default internet browser***

I2P is now started on your computer. You can close out all of your browsers, and that will not turn off I2P. You have to exit I2P from the toolbar. This is good, so you don't accidentally turn off your session of I2P. For some reason, my I2P wants to starts in IE. Here is my recommendation. Have one browser used only for I2P. So if you mainly use chrome, don't use chrome for I2P. the reason for this, is because I2P starts up slow. You have to let it collect information before you can move around in the I2P world. You want to be able to surf the normal internet on chrome, while I2P boots up on IE.

Okay, so you started the I2P program, it did it's thing, and it popped up a internet browser window with a purple background and words. If you don't want to use the browser it popped up, copy the address from the URL bar, open whatever browser you want, and paste it in. That simple.

Step 2: Ready for the "hard" part? And by hard, I mean spoon feeding a baby and they still manage to fuck it up.

Your going to need to change your browsers proxy *GASP.* Simmer the fuck down, just follow these simple instructions WHICH INCLUDES PICTURES. http://www.i2p2.de/htproxyports.html

Really folks, its copy and paste like 3 things.

After that, give it 30 minutes, and try to go to a market on I2P. At the moment, I'm only aware of themarketplace.i2p

Yes, I2P is kinda slow. More users will equal faster times.

Learn I2P people. Tor is about to tip over into the unsafe zone. Don't start worrying about it yet. Plans will be made and markets moved way before it comes to that point (I hope)


BONUS EDIT "BUT WHAT IF I'M ON TAILS?@?!?!?!"

Step 1: Turn on Tails
Step 2: Go to applications>Internet>I2P
Step 3: Success motherfucker, it's that simple.

Same "warm up" time applies to tor also, so don't get your panties in a bunch when you can't go to anything in 5 minutes.


If I fucked up something, let me know. I'm just a simple man. I put on my pants the exact same way as everyone else. Expect when I put on pants I do it surfing I2P :D

Agent

  • Sr. Member
  • ****
  • Posts: 332
  • Karma: +34/-8
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #1 on: November 30, 2013, 06:21:39 pm »
This information is correct, thank you for sharing this information with the community. i2p is a good alternative to Tor but they both have their pros and cons.

If anyone is wondering where they can go on the i2p network there is a new marketplace that from what I have seen so far has the same administrating rules as SilkRoad but is enforced with an iron fist and also has the same distributed server shceme as BlackMarketReloaded.

That being said it claims from what I read that they have taken security to the next level and think all marketplaces can learn a thing or two from it or at least share with the community if their methods are bunk in anyway like SheepMarketplace's auto PGP encryption.

themarketplace.i2p

View this website as a research tool only and I suggest you do not conduct any business on there as they have no form of forums or details on how their website is really secure over others.
Knowledge is power and as a community that knowledge can be used as a tool to aid the community, as I am only human if anything I submit on these forums is incorrect please contact me directly or quote the noted error and I can learn from my mistakes and minimize any form of misinformation.

Wonton

  • Full Member
  • ***
  • Posts: 134
  • Karma: +12/-3
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #2 on: November 30, 2013, 06:40:34 pm »
i2p will never be as popular as Tor due to the added complexity of setting up and the lag when connecting. Those who cannot figure out PGP would be lost trying to setup and use i2p. Best use of i2p is the access to free anonymous i2pmail it provides. Not many people using i2pmail (which is good) because they cannot figure out how to run i2p client.

whitelightwhiteheat

  • Hero Member
  • *****
  • Posts: 678
  • Karma: +143/-20
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #3 on: November 30, 2013, 06:41:45 pm »
subbing
We don't see things as they are, we see things as we are

emancipate yourselves from mental slavery...

Nunya

  • Jr. Member
  • **
  • Posts: 70
  • Karma: +21/-3
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #4 on: November 30, 2013, 09:19:07 pm »
sub

Beezerbuz

  • Full Member
  • ***
  • Posts: 187
  • Karma: +28/-10
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #5 on: November 30, 2013, 09:38:11 pm »
subbing

I'm putting on my noob hat. Can someone explain how you sub a thread?
You just did




inanna

  • Vendor
  • Sr. Member
  • *****
  • Posts: 370
  • Karma: +59/-12
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #6 on: December 01, 2013, 01:18:02 am »
Just click on "show new replies to your posts" and any threads with bumps you have posted in will show up.

99herps

  • Full Member
  • ***
  • Posts: 237
  • Karma: +50/-13
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #7 on: December 01, 2013, 03:44:24 am »
In my opinion there haven't been enough people studying the security of i2p at this point.

ModerationIsK3y

  • Jr. Member
  • **
  • Posts: 50
  • Karma: +2/-1
  • I Miss Tormarket
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #8 on: December 01, 2013, 10:02:03 am »
What "security"?

So far it's a friggin' sieve!

http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers

thevim

  • Newbie
  • *
  • Posts: 1
  • Karma: +0/-1
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #9 on: December 01, 2013, 11:50:07 am »
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Crenshaw's paper is talking about a badly implemented web server leaking its own IP address.
Also talking about correlating web server banners from i2p and clarnet, it would be very stupid to put a darknet marketplace webserver on clearnet too.
If this web server is running over i2p over Tor, two layers of mixing.
nothing can be 100% secure. It's about mitigating risk, and let's face it, After Silkroad 1.0 .. it would be difficult to trust Tor
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJSmyJGAAoJEI5ty8VD+YfqUlMH/0QRK41hywva/zC4no0YFk+h
M043uH9DXsnNv8GUntsa+zVNMYSfsQjgLCC2n1PZNhVqPSzX1HDEStECtPnzgVtr
I1cjWYuJoElJr4VCwsGBpXsd+30UZTfeZ1yv6uLlumeOUQqRgaJ+2ALBv7QZX90z
5AzSzTtia4Jj87KYX95Zbm89UR0GJdezY892bHpQ9IBGHMcLfxksvLsbKfiJwm5e
cwOxTELkreZB8JVN3iKmNL4THpn3j24AJWr+8nTPUyMjLB0PUQsHodClFpJMZUmz
xjPNdPPuE7Hsa88aVp7vWY4vedUw/FMFlAtGn3E8xgdm+/NO3BpDQdLzxWs2buY=
=/oMQ
-----END PGP SIGNATURE-----

MrCrane

  • Vendor
  • Full Member
  • *****
  • Posts: 169
  • Karma: +15/-6
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #10 on: December 01, 2013, 07:16:30 pm »
subbing

-MR. CranE-
*Official Review Thread*: http://silkroad5v7dywlc.onion/index.php?topic=2995.0

SR Vendor Profile: http://silkroad6ownowfk.onion/users/mrcrane

"When your whole wage is spent on food & shelter you work for the freedom to survive & that is called Slavery."

MaY G-D BlesS US AlL :)

-MR. CranE-

Dread Pirate Roberts

  • Captain
  • Administrator
  • *****
  • Posts: 566
  • Karma: +552/-41
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #11 on: December 01, 2013, 07:24:55 pm »
SilkRoad has decided at this moment in time there is not enough research into I2P and it has too many inherent weaknesses to open shop there at this moment in time. When it has been subject to several in-depth papers by world leaders analysts, then we will reconsider.
Quote 23: Criticism has plucked the imaginary flower from the chain not so that man may continue to bear the chain without consolation or fantasy but so that he may throw off the chain and cull the living flower.

Nameless

  • Jr. Member
  • **
  • Posts: 90
  • Karma: +4/-24
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #12 on: December 01, 2013, 07:38:58 pm »
I gave themarketplace.i2p a visit not long time ago, it had 3 listings....
Drugs is like sex, except sex is not like drugs...

sphinox

  • Newbie
  • *
  • Posts: 3
  • Karma: +2/-0
    • View Profile
    • Personal Message (Offline)
Re: Hey everyone, lets learn to I2P before it goes mainstream and uncool.
« Reply #13 on: December 02, 2013, 05:41:51 am »
I2P has definitely not been researched enough to be used for anything sensitive IMO. It also has inherent weaknesses for vendors, primarily the fact that enumeration of clients is trivial. Most I2P nodes route traffic for other I2P nodes, generally speaking it is not hard to enumerate the IP addresses of most clients using I2P. For most people this isn't an issue, but for vendors it is an issue due to the fact that they leak their rough geographic location when shipping product. If a vendor sends a package with a return address from a small rural city and the feds determine that the vendor is someone in that city or the surrounding area, they already have an anonymity set size for the vendor that is equal to every person in the geographic region around where the vendor shipped from. They also know that the vendor is someone using I2P if the vendor talks to them over the I2P network. The crowd size of people who live in any given small rural city who use I2P is going to be very small, it will probably consist of one person. Even in many large cities the number is going to be so small that it wouldn't cost much to put all potential targets under surveillance. Since the list of IP addresses of users of I2P is not hard to enumerate, this attack is not hard to carry out. I2P does allow for clients to configure themselves so that they do not route traffic for other nodes, the anonymity hit this brings with it has not been fully researched but it is thought to be significant. It certainly could increase vulnerability to internal correlation attacks, possibly negating one of the primary anonymity advantages of I2P. Also, if only vendors are operating in this mode then someone finding a client operating in this mode could guess with high probability that the detected client is a vendor.

Tor offers protection from this attack in many ways. Primarily, Tor has entry guards that clients always connect to as their first nodes. Entry guards are only rotated every few months by the client, limiting the clients exposure to enumeration. Bridges and obfsproxy can add significantly more protection from these attacks. Tor is by virtue of its initial design resistant to attacks like this, and due to the fact that the defenses from censorship also tend to protect from this class of attack Tor has further benefited from the great amount of time the developers have put into protecting from censorship.

Although Tor hidden services are not perfect they are resistant to a variety of quite bad attacks against the I2P network. Frequent downtime of an I2P hidden service can quickly degrade its anonymity set size even in the presence of a fairly weak attacker. I2P hidden services are weak to various intersection attacks that Tor hidden services are largely protected from. There really isn't much of an anonymity benefit to I2P, my opinion of it is that it is a trendy hobbyist network whereas Tor is more of a serious academic project.