If it shows “firewalled,” that typically means your router isn’t port forwarding traffic to your computer (I2P will attempt allow this through UPNP). This means that people will not be able to initiate connections with you, so seeding becomes more difficult. You can still contribute, but your computer would first have to connect to the peer or use an introduction service because of how the NAT system works.
Also to “bootstrap” your peers faster, I recommend downloading and seeding a bunch of popular torrents available on the Postman tracker site. In my experience it still takes a day, but you normally can build your “known” number to 1000+ by then.
Note that you might not be able to do anything about this, if your ISP has put you under a CGN (Carrier-Grade NAT), where there's a NAT on top of your router as well.
@@VivekYadav-ds8oz how do i open ports on cgnat? it was annoying me for years that i cant host a game lobby with my friends. isp site offers some bs called "white ip address", but i dont plan on hosting full blown sites which they tout this feature as such. i just want friends to join my games
i was very confused by the "uncensored bible" site you opened, then it hit me there's probably places in the world where viewing the bible would be a serious crime. crazy the world we live in
Altough to be fair, Christianity is the least persecuted Religion in the World, mainly because it's so god damn huge. China isn't to keen to any religion in General, North Korea isn't fond of relgion either (altough: good luck viewing anything online there anyway) and those are propably some of the most "harsh" countries in that regard. Some islamic Nations aren't to happy about christianity either, but usually you'll still be fine there and won't get in trouble for reading your bible online. Islam is still more pursecuted, which sounds ironic, but many nations that tolerate christianity aren't happy about Islam the slightest. Oh and if you are a Jew: Good luck. Stay inside western countries, they accept it, but pray that no Neonazis will come to kill you; other then that, many folks are pretty antisimetic. Never, ever, set foot in a country, where the majority is islamic. Israel would be the place in theory, unfortunately terrorist will visit tel aviv on a daily bases. And yeah in general... good luck, you will unfortunately really need it as a jew. I've met quite few Jews, and not a single one of them have not experienced some kind of at least verbal violence and opression.
@@sagichdirdochnicht4653 i disagree that Christianity could be designated as "least persecuted". look at Pakistan and the frontier territories of Islam Jihad. there are extensive regions even in "western" countries as well where practicing Christians are ostracized by the people grown up on pop media.
Only 9 peers after 18 hours, i had over 1000 in that time, your port forwarding is definitely not set properly or maybe you're behind CGNAT. That's also why it says firewalled, it's reffering to unreachable inbound port, not the OS firewall. Speaking of browser profiles, my solutions is to use two browsers, Firefox for normal browsing and Pale Moon configured to work with i2p. Also if you mess with config files you can set the proxy to listen on your LAN adress instead of localhost so you can run it on some spare laptop or something else that just stays on 24/7 instead of your main PC.
Firewalling in VMs that can only go through VPNs is always fun. Spin em up, suspend them, clone them, store them as differential disks, encrypt them. Still not as good as dedicated but much better than mixing things on one system.
@@tab4340 Just 20 years ago who would have thought this would be possible. Not me, and I am a programmer. Of course, I am also the one that thought google wasted their money on this website called youtube.
@@LLPOF true. How strange. Also how strange that in a place such as dark nets there is a Christian movement. As if Christians have to hide now. It's all strange how the world is moving. I won't get preachy.. But it's an eye opener.
It's probably not gonna work. Discord has features that irc lacks. Best next thing might be making a riot.im (now element.io) server. It's as close as you can get to a self-owned version of discord. But back when i tried it was very buggy. Servers were unstable and crashed after enough messages (which isn't even that many) were indexed. Hopefully it's better now
@@tfwmemedumpster No, actually there is a way to make a bot to forward irc messages to discord. I don't know how, but I know for a fact that the guys on Overthewire use something like that for their discord/irc channels
@@zeroday5441 Lineage OS /e/ by e Foundation building android 10 from source All of them are ungoogled & open source so there is nothing wrong with them
@@nothing2see996 yes, but they're not as secure as CalyxOS or GrapheneOS Pixel provides an unlockable/re-lockable bootloader (AKA Verified-Boot) While, the Lineage &/e/ does not I'm surprised that they haven't tried porting to FairPhone
That is a really cool concept, it reminds me of the system in the show "Silicone valley" where data is stored and transferred by every device connected to the service. I wonder if they took inspiration from I2P
fantastic observation bro that’s just how p2p platforms work if im not mistaken, like crypto, limewire, torrenting, even playing games without dedicated servers i think.
Use a VPN, if your not doing anything illegal (& sometimes even if you are) there is no way for a service to get your real IP address. Though hiding your connection is just part of the issue, you also need to make sure that you dont leak info about yourself.
i love how cutesy I2P looks and then you realise some people are going to be doing illegal stuff on it. Imagine clicking a link you'd think would be safe and then see something horrible, and you just remember that cute little yellow-red mascot
Just like any other computer tool. Even a rock can be used for good as well as bad intensions. Remote desktops are for help desks or to load malware. UPnP was made by MS to ease life, not create ddos attacks.....
@@littlepeon yeah, i have really bad personal trauma about thinks like that. one time i caught my pet rock looking at absolutely disgusting things on the deep web. so we had to sit down and have a little chat about it. things got heated and i threw him at the wall, and now we don't really talk to eachother very much.
Massachusates health notification is installed without permission Just like that u2 song on itunes ( the lyrics perfectly match with case) Did it happened to you ?
Watching borderline content is the best way to waste their time and money which is the only way to get back at power hungry, invisible, corrupt entities that have ruined many many lives through their excessive paranoia and failed criminal justice system. The more people do it the better. If everyone left Facebook, watched borderline dodgy but interesting shiz on YT their systems (that we have all paid for) would crumble overnight.
I did this exact setup on macbook with i2p and firefox settings and could not connect to any sites whatsoever even though im connected and have over 20 peers. none of the i2p sites work. can't connect to anything. suggestions?
when will you do a deep dive on oxen, it started out as an ambitious Monero fork, but it is now a decentralized privacy suite, it has a decentralized signal fork called Session, a new onion routing protocol called Lokinet, a private name service for Lokinet called ONS, a private DEFI solution fast transaction system called blink, and it is all open source. The whole system attempts Sybil resistance and 51% attacks through a market approach. I think it is the best option available, but I want to hear your opinion too.
so if you want to use it, you are obligated to be a jump node also for torrents. hence in many countries you get in jail as at some point you address is displayed to a user in the torrent network regardless if you use it yourself.
Thank you. Btw I love your videos your like my news channel and i really like watching them bc it's very entertaining and gives me information without doing much research xd
Why is it called "darknet" anyway, why not call it "freenet" or "open net"? Like the middle of the ocean, where there is no jurisdiction, is not called "darksea" but "open sea", right?
@@MentalOutlaw Generally, any. Your channel has never had and I wonder about that. I can see how MANY tech firms would like to sponsor you, especially some VPN's that are actually privacy-respecting, or maybe somenthing like System76. You can 100% get one, why not?
Oh, well right now I'm more focused on learning full stack so I can build some web apps for you all to interact with. I might do sponsorships at some point, but its hard to find ones that write honest ads.
Is it just me, I cant see this video when I go to your channel. I cant see the "Mix" playlist either. this video and mix happened to pop up when i searched I2P
@@mckendrick7672 1. No Tor is not peer to peer. Tor uses servers. 2. Also in Tor it gets Router between multiple servers so the destination does bot know the original IP adress.
@@timeTegus You can call it “servers”, all those servers are are nodes through which you route your traffic. On I2P everyone is a node and traffic is encrypted through multiple layers, you know not where the destination of the message is, only the next destination from your node, and the previous node from which it was sent.
@@mckendrick7672 so i2p also has multiple layers like Tor? This was my question. For me I was not clear that this is the case. Then it would also be secure. Because when we talk about torrents ( they are peer to peer) and they don't have multiple encrypted stops. So torrents are not secure
The concept seems neat but isn't JavaScript proprietary so doesn't that defeat the whole purpose of it and what are the useful sights and services to access though it? I guess maybe safer email and torrents. Seems very what Hollywood assumes hackers do but I have no idea.
Javascript is what every browser runs and it's all runtime interpreted - and you can turn it off anyways. The Java Virtual Machine, which is what the I2P executable runs on, has open source and proprietary implementations.
I’ve designed a protocol that masks as HTTPS with layered security and relaying properties that is unidentifiable from external inspection… I have named it chilli 🌶 for the holy trinity of tasty ingredients
If you keep to the latest version, don't you also risk getting the latest backdoor that might've been put there intentionally by somebody who hacked some accounts or servers where i2p is stored ?
Could someone explain why I should look into this instead of using Tor? Tor alreay has lots of "dark" content. So why use this? Im looking for motivational reasons. Thanks
It's more a matter of technology than content - I2P is superior in terms of the means by which it functions. It's far more resistant to attacks which Tor can be susceptible to because everyone is functioning as a node and there are no "exit nodes".
Christ, it’s a jar file? That means, that it’s a Java app, which also means the accessibility with screen reader is most likely total crap! I wonder if there is a web browser that uses i2p that uses a UI like firefox, so it will be screenreader accessible? I hate java!