HiddenVM
i2pd
Our great sponsors
HiddenVM | i2pd | |
---|---|---|
14 | 54 | |
2,088 | 3,059 | |
- | 1.1% | |
7.7 | 9.5 | |
about 1 month ago | 6 days ago | |
Shell | C++ | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
HiddenVM
- HiddenVM – Use any desktop OS without leaving a trace
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added new sub-route to the TAILS route using the HiddenVM project https://github.com/aforensics/HiddenVM for providing Plausible Deniability within TAILS
-
Most Secure Host OS
As per the documentation of the HiddenVM project (see https://github.com/aforensics/HiddenVM#but-doesn-t-whonix-inside-tails-mean-tor-over-tor). The VMs won't be using TAILS Tor connectivity. So there is no network chaining. It's not Tor over Tor and the Whonix VMs will have their own classic Tor connectivity but benefiting from TAILS well implemented Amnesia on the Host. I had no important issues so far.
You could also use TAILS with HiddenVM https://github.com/aforensics/HiddenVM which is also quite secure combining both TAILS/Whonix and Veracrypt plausible deniability features if you want.
i2pd
- I2P: End-to-End encrypted and anonymous Internet
-
ansible role for i2pd
I created an ansible role for i2pd. Basically, this allows system administrators who want to take part in the I2P network to automate i2pd deployment.
-
Freenet 2023: a drop-in decentralized replacement for the web - and more
Check this: https://i2pd.website/
-
Cloudflare Disables Access to ‘Pirated’ Content on Its IPFS Gateway
> We are building network which helps people to communicate and share information without restrictions.
> Free from censorship. Free from privacy violations.
I2P is neither “for” nor “not for” piracy. I2P is for protecting communications and data from any kind of censorship.
Filtering copyright violating content is a type of censorship. To some it is justified. To others it is not.
To a network protocol like I2P the point is that no kind of censorship should be possible. Regardless of reason.
-
⟳ 0 apps added, 32 updated at f-droid.org
i2pd (version 2.46.1): Full-featured C++ implementation of I2P client
-
Release: i2pd v2.46 in docker and a few new I2P videos from FOSDEM 2023
Here are the release notes of i2pd 2.46: https://github.com/PurpleI2P/i2pd/releases/tag/2.46.0
-
Ban on Monero on CEXs Unveils XMR's True Potential
Better than Tor, IMO. You can read more about i2p at https://geti2p.net, https://i2pd.website, and ask more in-depth questions in /r/i2p.
-
[January 30th] Slight delay, re-launch imminent
I2P Bundle: https://github.com/PurpleI2P/i2pd
-
⟳ 1 apps added, 20 updated at f-droid.org
i2pd (version 2.45.0.1): Full-featured C++ implementation of I2P client
-
📑 MiniBolt resources 📚 List of the MiniBolt core/bonus guides + latest versions
i2pd v2.44.0 (Released: 20th November 2022) - https://github.com/PurpleI2P/i2pd/releases
What are some alternatives?
i2p.i2p - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Whonix - Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
i2p-zero - Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface
i2pplus - I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
BrowserBox - Install and run Firefox on Debian unattended in a virtual machine or on a computer.
go-incognito - Go Incognito: A Guide to Security, Privacy, & Anonymity
Freenet - Freenet REference Daemon
InviZible - Android application for online privacy and security
i2pdbrowser - i2pd browser bundle
ouinet - This is a read-only mirror of: https://gitlab.com/equalitie/ouinet/
dohot - DoHoT: making practical use of DNS over HTTPS over Tor
FlorisBoard - An open-source keyboard for Android which respects your privacy. Currently in early-beta.