Nice
Nice
The OG I2P program is written in Java, which might show behavior like you mentioned (didn’t stop immediately when stopping the service).
Please try I2PD, it’s written in C++
The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it’s design, doesn’t even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).
Thanks
VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.
I will repeat what I said to the other commenter: please read the documentation. Being a router doesn’t mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there’s a zero day I’m unaware of, you are perfectly safe.
A VPN company can easily give up your details to the police who are now actively going after citizens. VPNs are not enough anymore.
Is there a problem with I2P adoption? I’m sensing a massive lack of interest from this thread
Install Gentoo on her MacBook
Thanks, saved
Would you know where I can find a guide to load balance I2P routers?
Thank you, this is very helpful. I’ll read
Thank you, where can I read a guide on this?
Does Qbittorent support I2P natively? If so, I can probably run it on my seedbox. Never tried it before
Use something that can do TCP, i.e. HAProxy, NGINX or Apache
Support Mullvad.
You should have bought the framework after they put more effort into Coreboot.
Pine64 and Fairphone are good companies too
Thanks man. I would much rather give my time than my money for OSS projects, but I have a lot to learn and do not match up the quality of contributions needed in said projects. I’ll do what I can.
It definitely makes a difference, and putting money into Wikipedia is a great use of funds. The reason I asked the question is because I’m not well off, but I still like to donate to projects from time to time. This means I have a limited (and strict budget), and was wondering if they need my tenner badly enough to send marketing emails over it. Because I’d like to donate to people who actually really need the money, and Wikipedia will do just fine for some time without my money going to them.
Yeah I need to look at the list and check if there’s something important for me in there
I think they need my help
I need to look up what else they sponsor in case there’s something important for me there
Thanks
Just let her have Gmail if she is willing to divorce you over windows and email (what a handful you’ve caught there lad)
Clevis and Tang but even that can only really do so much.
Just encrypt storage on-site