1 posted on
11/15/2011 4:26:45 AM PST by
ShadowAce
To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...
2 posted on
11/15/2011 4:27:21 AM PST by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: ShadowAce
So, was this used at Penn State?
(Sorry, couldn’t resist ;-)
3 posted on
11/15/2011 4:34:28 AM PST by
vanilla swirl
(We are the Patrick Henry we have been waiting for!)
To: call meVeronica
To: ShadowAce
How exactly does I2P discover and connect to peers? How do you know that the peers are in fact legitimate?
To: ShadowAce
"As I explain this to help you maintain priviacy, there will always be a few bad apples in the crowd. I do not condone this use of this article for anything illegal. Even if you are not passing illegal information on I2P, please check your country's laws on encryption and it's exportation before you begin."
You have to say that. But of course that is what it is for. They are not bad apples. They just choose to be independent of the regime, which is a nullification of the law. If enough people do it, the so-called law is relegated to a vacant gesture. There is nothing sacred about a law. It is just what a bunch of people say, a notice that thus and such will be done to you if you are caught. You can take it seriously or call their bluff.
7 posted on
11/15/2011 5:28:40 AM PST by
UnbelievingScumOnTheOtherSide
(REPEAL WASHINGTON! -- Islam Delenda Est! -- I Want Constantinople Back. -- Rumble thee forth.)
To: ShadowAce
an exit node for Tor allowed all the traffic on the Tor network to pass right through your machine IIRC, this isn't correct. However exit nodes do have access to the unencrypted information. This is where https comes in.
Tor certainly isn't perfect and it doesn't provide strong anonymity. I2P sounds interesting. Even if Tor did provide strong privacy, the more anonymizers there are out there, the harder it is to have one's privacy compromised.
8 posted on
11/15/2011 5:51:45 AM PST by
FourPeas
("Maladjusted and wigging out is no way to go through life, son." -hg)
To: ShadowAce
9 posted on
11/15/2011 6:27:08 AM PST by
Mycroft Holmes
(Returned for regrooving...)
To: Constitution Day; Tax-chick; ShadowAce
While, this sounds simple, there is actually a lot of work going on with I2P to achieve this....downfalls of its predicessor
Linux apparently doesn't have spell/grammar check.
To: ShadowAce
11 posted on
11/15/2011 12:05:39 PM PST by
JOAT
To: ShadowAce
Interesting. I didn’t see any packages for my version of Fedora. I’ll see if I can’t get a good build and play with it. I wonder how much traffic it will generate if you just bring up the client to act as a node.
12 posted on
11/20/2011 3:43:01 PM PST by
zeugma
(Those of us who work for a living are outnumbered by those who vote for a living.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson