Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 11/15/2011 4:26:45 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

2 posted on 11/15/2011 4:27:21 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

So, was this used at Penn State?

(Sorry, couldn’t resist ;-)


3 posted on 11/15/2011 4:34:28 AM PST by vanilla swirl (We are the Patrick Henry we have been waiting for!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: call meVeronica

Bump


4 posted on 11/15/2011 4:37:06 AM PST by call meVeronica
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

How exactly does I2P discover and connect to peers? How do you know that the peers are in fact legitimate?


5 posted on 11/15/2011 5:04:18 AM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
"As I explain this to help you maintain priviacy, there will always be a few bad apples in the crowd. I do not condone this use of this article for anything illegal. Even if you are not passing illegal information on I2P, please check your country's laws on encryption and it's exportation before you begin."

You have to say that. But of course that is what it is for. They are not bad apples. They just choose to be independent of the regime, which is a nullification of the law. If enough people do it, the so-called law is relegated to a vacant gesture. There is nothing sacred about a law. It is just what a bunch of people say, a notice that thus and such will be done to you if you are caught. You can take it seriously or call their bluff.
7 posted on 11/15/2011 5:28:40 AM PST by UnbelievingScumOnTheOtherSide (REPEAL WASHINGTON! -- Islam Delenda Est! -- I Want Constantinople Back. -- Rumble thee forth.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
an exit node for Tor allowed all the traffic on the Tor network to pass right through your machine

IIRC, this isn't correct. However exit nodes do have access to the unencrypted information. This is where https comes in.

Tor certainly isn't perfect and it doesn't provide strong anonymity. I2P sounds interesting. Even if Tor did provide strong privacy, the more anonymizers there are out there, the harder it is to have one's privacy compromised.

8 posted on 11/15/2011 5:51:45 AM PST by FourPeas ("Maladjusted and wigging out is no way to go through life, son." -hg)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Interesting, thanks.


9 posted on 11/15/2011 6:27:08 AM PST by Mycroft Holmes (Returned for regrooving...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Constitution Day; Tax-chick; ShadowAce
While, this sounds simple, there is actually a lot of work going on with I2P to achieve this.

...downfalls of its predicessor

Linux apparently doesn't have spell/grammar check.

10 posted on 11/15/2011 7:14:22 AM PST by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Ping


11 posted on 11/15/2011 12:05:39 PM PST by JOAT
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Interesting. I didn’t see any packages for my version of Fedora. I’ll see if I can’t get a good build and play with it. I wonder how much traffic it will generate if you just bring up the client to act as a node.


12 posted on 11/20/2011 3:43:01 PM PST by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson