There were a few private gitea forges, a couple of inactive blogs, and so on. They can keep the current addressbook as a "historical" section, but the the main list should be updated 1-4X per year to prune dead sites.
A good idea would be a Wi-Fi intermediary that you connect to the #hotel_wi-fi and it presents as a single device ... but you can connect multiple devices behind it. And yes, building in #Tor, #I2P, #OpenVPN, #WireGuard, #IPSec endpoints that could be used to prevent the hotel's network and its users from spying on your traffic would be great.
I think I'll go back to carrying a Wi-Fi hotspot when I travel. (I do occasionally use my phone as a hotspot, but battery life is not good when the hotspot is running.)
@thndrbvr @dorkbird Did you ever try #I2P? I found the app in #F-droid, so I installed it, but it took years before it actually worked on any of my devices. Then, once I finally got it working, I found a directory in which most of the links were dead ... there was no longer a site there.
One thing I want to do while I'm home is set up some p2pnet endpoints on #RasPi or other SBC boards on a separate subnet from the rest of my network.
In particular, I'm thinking about #SafeNetwork / #MaidSafe (or as I call it, "The MaidenSavers), #IPFS, #DAT. Maybe I could even host a small #Tor onion site or #I2P eepsite.
That's likely to be something I do _after_ I put my servers back in the rack and install some up-to-date OS on them. (I need to do that for job.next() purposes. The p2pnet stuff is just because I'm curious about it.)
@ajroach42 #I2P doesn't connect as well to outside sites, so where you may use #Tor to anonymize browsing of clearnet sites, you'd usually use I2P to visit eepsites (and according to what I'm told, torrenting is a big part of I2P use).
I did not find a large enough number or variety of eepsites to retain my interest, but there could be many more that did not show up in the directory my browser used.
Using i2P for #Android with the internal browser and default settings. I’m not really sure what it offers or why someone would use it, given the experience of it never working before (and not correctly now).
i'd be a lot more interested in bringing optional onion routing to #cjdns than normalizing #tor use. its a lot less error prone to set up a container to network over a tun than it is to make sure that some combination of proxies doesn't accidentally leak your ip address.
operating at layer 2 makes it much much simpler to get your software working over an anonymous overlay network since the software can behave normally. i don't know of anyone that is doing this, but i don't see any reason why it wouldn't work. it'd also be a great opportunity to incorporate some of the decentralized anon routing tech that #i2p uses.
@paulfree14 @mistressemelia Have you considered running a #tor hidden, and #i2p service. Self-authenticating endpoints, *practically* uncensorable. Also... everyone knows how to use tor browser, so user adoption is easy!
@1iceloops123 For obvious reasons, I do not keep up on the happenings on #DailyStormer. What happened between them and #Tor? Have they investigated using eepsites ( #I2P ) and #Dat?
nobody can find you or your device unless they can break i2p. from the outside, Others can only tell if you are online or not. so the default interaction model is anonymous, but you can always add support for persistent identity. the reverse is much harder. there is potential for abuse here, but it can be solved with WoT and #p2p reputation (or other novel solutions i haven't thought of)
if you care preventing censorship, which is what i think this free speech debate is really about, contribute to #tor#i2p or any technical solution to your problem with whatever skills you have free software projects need a lot more than sw dev to be successful