mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#i2p

4 posts4 participants0 posts today

Email is an open standard! Yet corporate USA has stole it from us. Let's all reclaim our #Email

We need to run our own email servers again and make email a community thing!

Enable running a server from home! Add email servers on .alt, .i2p, & .onion! Support people unable to rent a VPS or get a global domain name! Not everyone has access to a credit card or bank account.

Let's make email open & social again!

Support #OpenPGP!!

#SMTP#IMAP#POP3

I was curious about ZeroNet again today. ZeroNet was a #P2P web project from the 2010s along similar lines to I2P (en.wikipedia.org/wiki/I2P) and #Tor hidden services. The idea of hosting dynamic webpages in a completely P2P fashion, like torrents, remains super cool and appealing to me. In fact, at one point the #BitTorrent company had a similar proposal (bittorrent.com/blog/2014/12/10).

The ZeroNet website (zeronet.io/) is still up, but the project hasn't been updated in five years as per the GitHub repo (github.com/HelloZeroNet/ZeroNe). Someone was maintaining a fork at some point, and at other times I heard that ZeroNet was (now?) insecure, although I know no details. Certainly anything P2P isn't anonymous by default.

I found this question (github.com/HelloZeroNet/ZeroNe) about the creator of ZeroNet. Disturbingly, this article (newsbtc.com/news/sam-maloney-c) about a different developer killed by the police under unusual circumstances was shared.

My impression was that ZeroNet actually worked (works?) to some extent. Why aren't projects like this being funded? We need censorship-resistant ways of communicating online, after all.

en.wikipedia.orgI2P - Wikipedia

I find networking tech fascinating, and I like overlay networks. I've recently found out about #I2P and it seems interesting but I'm not quite sure what a typical use case is. Anyone on the Fediverse want to enlighten me as to how they personally use it?

Разработка скрипта для распознавания капчи Cloudflare
habr.com/ru/articles/892986/

Я понимаю, что иногда Cloudflare используют, чтобы скрыть настоящий #IP-адрес сайта. Или чтобы сайт, у которого нет #IPv4-адреса, был доступен и тем пользователям, у которых в 2025 году почему-то всё ещё нет #IPv6. Было бы лучше, если бы каждый сайт за Cloudflare был доступен также в скрытосетях: #Tor #onion, #I2P.

#captcha #капча #Cloudflare @rf @russian_mastodon @ru

ХабрKак обойти капчу Сloudflare Turnsile — или обход Cloudflare разной степени сложностиВ рамках научного и исследовательского интереса решил поэкспериментировать с распознаванием сложных типов капчи, ну как поэкспериментировать - скорее проверить работоспособность и умение электронного...

Yggdrasil

I'm on now, its a full network and its fast. Lots to learn but this is going to be fun, also great docs for using #tor #i2p #opennic and much more. lots of sites use *.ygg domain that you need to add to your instance. Recommend to setup a #VM and and run an instance.

RetroShare is a free, cross-platform software for serverless communication, including letters, instant messages, and file exchanges over an encrypted F2F/P2P network. This network is built on GPG algorithms and the Perfect Forward Secrecy protocol.

bastyon.com/post?s=5b8ca60211e

What is RetroShare?
RetroShare is part of the darknet class of networks, where connections and data exchanges are limited to a specific group of participants, excluding external contacts. In this network, participants' IP addresses are hidden from each other, except within a trusted circle.
Instead of using IP addresses for packet addressing, RetroShare employs a 128-bit random identifier—an anonymous ID. This makes it nearly impossible to determine the IP addresses of participants, even within a user's close network. In essence, monitoring file-sharing or communication activities is exceedingly difficult, and determining the number of participants in the dark network is non-trivial.
Key Features of Dark Networks
Dark networks like RetroShare share two important characteristics:
Difficult Monitoring: It's hard for external parties to monitor user activities, as they are not connected to the network.
Invisible Connectivity: It is impossible to know whether a user is connected to such a network from outside the immediate environment, making RetroShare hard to detect.
This distinguishes dark (private) anonymous networks from public anonymous networks, where participants' IP addresses can be observed directly or indirectly. Furthermore, connecting to an arbitrary node in RetroShare requires confirmation from the counterpart, which adds an extra layer of privacy.
A Simple Guide to Connecting to RetroShare
This article is for those who want to quickly connect to the RetroShare network without delving into the complexities of accessing it via Tor or I2P. Here's a simple guide to getting started with RetroShare:
Download and Install the Client Program
Visit the official RetroShare website: retroshare.net.
RetroShare is cross-platform, which means it supports various operating systems, including mobile ones! Linux users can build from source, but for simplicity, we’ll use an AppImage.
Set Up the Program
It's recommended to route all traffic through a VPN for added security. Leave it enabled for the duration of RetroShare’s usage. If you’re communicating only with trusted individuals (e.g., family), it’s not critical.
Download the AppImage here: RetroShare AppImage.
Make the file executable by right-clicking and enabling the "Allow execution of the file as a program" option.
Open a terminal and navigate to the file's location: /root/RetroShare-0.6.4.20180313.0e6d27ad-x86_64.AppImage.
RetroShare will launch, and a new profile creation window will appear. Before proceeding, click on “Options” in the top-right corner.
Configure Your Profile
Fill in the following fields:
Name
Device Name
Password (and confirm)
Chat Name
Encryption Key (be sure to set it to 4096 bits)
Node Settings (leave as default)
Entropy (wait until the bar is full)
Once done, click "Let’s Get Started." RetroShare will generate your certificate, which can be shared via closed channels or in person. You can then request and add the certificate of the person you're communicating with.
Network Settings
Before diving into the network, it’s essential to modify some default settings:
Expand the service data exchange channel and increase the number of tunnels available to other users.
Higher values mean you contribute more to the network by handling both your own and transit traffic from other users. The default is set for a 20 Mbit/s network speed, but you can increase it based on your actual connection speed.
Check the “Use relay servers” box if you have a restrictive router or firewall. This ensures easier access to the network.
Set the destination folder for downloaded files to avoid confusion later. By default, files are saved in a hidden directory like: /root/.retroshare/LOC06_c098e80721a7d1685271211cbe361c03/Downloads.
Finding Trusted Peers
If you don’t have friends using RetroShare but wish to join the dark network, finding trusted peers can be challenging. However, RetroShare now makes this process easier. You can find trusted peers in the built-in chat by exchanging certificates with other users or robots on websites like retroshare.ch.
Enter your certificate in the provided window, press "Submit," and obtain the server certificate. Copy it and add it to your RetroShare certificate list.
Connecting and Building Your Network
Once connected, RetroShare will notify you, and the first node will appear in your list. You can set the trust level for each node according to your discretion.
RetroShare’s Features
Now that you're connected, RetroShare offers a wide range of services:
Contact List
Chat
Post Office
File Sharing
Channels
Forum
Publications
Unlike regular networks, RetroShare keeps the connection details of users within your trusted environment hidden from others in the network. Only those within your immediate network can know you’re connected to RetroShare.
Enhancements with Tor Network Integration
Starting from RetroShare version 0.6, the platform integrates with the Tor network for added privacy. As long as Tor is reliable, RetroShare remains secure, even if the user’s exchange of certificates is disorganized or the settings are unconventional.
The Dark Network and the Role of Authorities
Anyone who exchanges their personal certificate with a RetroShare node becomes a full-fledged member of the dark web and can receive data from anonymous sources. Interestingly, a representative from a punitive or detective agency, after exchanging certificates with two or more nodes, can become a transit point for encrypted data across the network, without knowing the source or destination. This ensures that even law enforcement, while helping grow the network, cannot trace the traffic.
Final Thoughts
Take care of yourself, user! This article is purely informational and does not advocate for any particular actions. The author holds no responsibility, as the ideas presented here are hypothetical, with all coincidences to real events or names being purely accidental.
Author: Telegram Channel @ZapiskiLizermana (Lizerman's Notes)
Швейцарский нож среди мессенджеров
omimedia.blogspot.com/2025/03/
#RetroShare #Darknet #Privacy #Security #Encryption #P2P #Anonymous #SafeChat #OpenSource #DigitalPrivacy #CryptoNetwork #MessagingApp #FileSharing #TechForPrivacy #Tor #I2P #PeerToPeer #EncryptedNetwork #Decentralized #PrivateComms #SecureFiles #AnonymousMessaging #DataPrivacy #RetroShareGuide

Candidate #i2p vanity addresses so far: ("immibis" + as many moderately pronounceable or memorable random letters as the randomness gives me + totally random letters)

immibisbuzgk6s5m4drusp2jrnvbptvbtomd2eeeumnxgkhyodsq.b32.i2p
immibispylebsmbrrtijf2c5uwdzy6gh422b37b7igmcvadrnssa.b32.i2p
immibistainzycldx5dgnv6uhlskr3ntlbui2u75s77wfhlfqjmq.b32.i2p
immibislxgddoawaggyiwvhu4hu6lh4ms2kzmodml3rngnzki5fq.b32.i2p
immibisnekifq5q3mjiaovkfxsosvc6uvgumnrnl5d5gojjiudiq.b32.i2p
immibis5wavtw4kio5g55eylp2fjvsxtxcr366odaniqocvpwzpq.b32.i2p