HiddenVM
i2pd
Our great sponsors
HiddenVM | i2pd | |
---|---|---|
14 | 54 | |
2,221 | 3,093 | |
- | 1.9% | |
7.7 | 9.5 | |
4 days ago | 5 days ago | |
Shell | C++ | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
HiddenVM
- HiddenVM – Use any desktop OS without leaving a trace
- A virtual machine ***within*** tails
- Veracrypt, hidden OS, Linux alternative
-
what is the best version for tails in a windows 11
Wait, OP, I really don't recommend you try Whonix inside of Tails. This will bring a Tor Over Tor scenario if you don't specially configure Whonix in a way that prevents this. There have been projects such as HiddenVM that have tried to make this work, but Whonix developers say that there won't be any support for this setup. TAILS most likely won't have any support for this either. Whonix already has live mode on the VM level, and if you want a host-level live system consider Kicksecure Host Live Mode. Whonix is also in the middle of developing a Whonix Live Host System as well.
-
TAILS 5.0 cannot run appimages from separate media
crosspost for reference: https://github.com/aforensics/HiddenVM/issues/23
-
Run Virtual Box
Yes it is. Look into HiddenVM. https://github.com/aforensics/HiddenVM
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
Whats a feature that you guys would want in future tails versions?
It is possible to do it safely using this : HiddenVM
-
Whonix in Tails
Check out this project on GitHub. You run Whonix on Tails (Amnesic Live Mode) from a Hidden Volume using Veracrypt : HiddenVM
i2pd
-
I want to help the network, but need assistance
I'm running a tor bridge on my home proxmox box, and I'm interested in running an i2p node as well but I have no experience with this. From what I was able to gather the easiest way is to install the i2pd .deb (https://github.com/PurpleI2P/i2pd/releases).
-
[task] link me up with i2pd (c++) developers for a small fee
need someone to find me c++ developers who are very familiar with the i2pd codebase and link me up with them for the price of $25 USD (I can do payments in crypto or cashapp).
- I2P: End-to-End encrypted and anonymous Internet
-
Tor’s history of D/DoS attacks and future strategies for mitigation
If you really dislike Java that much, there are other I2P implementations like this:
https://github.com/PurpleI2P/i2pd
-
ansible role for i2pd
I created an ansible role for i2pd. Basically, this allows system administrators who want to take part in the I2P network to automate i2pd deployment.
- I2P adoption in qBittorrent has begun
-
Freenet 2023: a drop-in decentralized replacement for the web - and more
Check this: https://i2pd.website/
-
i2pd
there may be instructions in the github i think? https://github.com/PurpleI2P/i2pd
-
Cloudflare Disables Access to ‘Pirated’ Content on Its IPFS Gateway
> We are building network which helps people to communicate and share information without restrictions.
> Free from censorship. Free from privacy violations.
https://i2pd.website/
I2P is neither “for” nor “not for” piracy. I2P is for protecting communications and data from any kind of censorship.
Filtering copyright violating content is a type of censorship. To some it is justified. To others it is not.
To a network protocol like I2P the point is that no kind of censorship should be possible. Regardless of reason.
What are some alternatives?
Whonix - Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
i2p.i2p - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
BrowserBox - Install and run Firefox on Debian unattended in a virtual machine or on a computer.
i2p-zero - Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface
go-incognito - Go Incognito: A Guide to Security, Privacy, & Anonymity
i2pplus - I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
dohot - DoHoT: making practical use of DNS over HTTPS over Tor
Freenet - Freenet REference Daemon
mbp-tails - How to get Tails working on T2 Apple device (e.g. 2019 MacBook Pro) without needing external keyboard/mouse.
InviZible - Android application for online privacy and security
awesome-malware-analysis - Defund the Police.
i2pdbrowser - i2pd browser bundle