Most of the generic services needed for reasonable privacy and some anonymity can be found in I2P without using other products.
For right now, the installation is not as easy as a regular program, but not too hard either.
The online documentation for Debian (and, thus, Devuan) and the forum entries are a bit dated. This makes it even more confusing when you have products that are maturing fast, and more recently. But I’ll point out some of those “landmines” here too.
First up, realize that I2P is already IN Debian. In this case, I’m using the Armbian port of Debian to the Odroid N2 platform. (I’ll try others, including Devuan, later).
Here’s what you get with an “apt-get install i2p” request:
root@OdroidN2:/# apt-get install i2p Reading package lists... Done Building dependency tree Reading state information... Done The following additional packages will be installed: apparmor ca-certificates-java famfamfam-flag-png geoip-database gettext-base i2p-router java-common libeclipse-jdt-core-java libel-api-java libgetopt-java libjbigi-jni libjetty9-java libjson-simple-java libjsp-api-java libservice-wrapper-java libservice-wrapper-jni libservlet-api-java libservlet3.1-java libtaglibs-standard-impl-java libtaglibs-standard-jstlel-java libtaglibs-standard-spec-java libtomcat9-java libwebsocket-api-java openjdk-11-jre-headless service-wrapper Suggested packages: apparmor-profiles-extra apparmor-utils privoxy syndie default-jre libgetopt-java-doc jetty9 libjson-simple-doc libservice-wrapper-doc tomcat9 libnss-mdns fonts-dejavu-extra fonts-ipafont-gothic fonts-ipafont-mincho fonts-wqy-microhei | fonts-wqy-zenhei fonts-indic Recommended packages: fonts-dejavu The following NEW packages will be installed: apparmor ca-certificates-java famfamfam-flag-png geoip-database gettext-base i2p i2p-router java-common libeclipse-jdt-core-java libel-api-java libgetopt-java libjbigi-jni libjetty9-java libjson-simple-java libjsp-api-java libservice-wrapper-java libservice-wrapper-jni libservlet-api-java libservlet3.1-java libtaglibs-standard-impl-java libtaglibs-standard-jstlel-java libtaglibs-standard-spec-java libtomcat9-java libwebsocket-api-java openjdk-11-jre-headless service-wrapper 0 upgraded, 26 newly installed, 0 to remove and 1 not upgraded. Need to get 65.6 MB of archives. After this operation, 213 MB of additional disk space will be used. Do you want to continue? [Y/n]
Notice all the Java related libraries? Yeah, not going to be that efficient in Java. Good enough for small iron, one hopes. We’ll see when I move “down scale” to my lighter weight platforms without 4 GB of memory and 4 A73 cores running at 2 GHz… provided this one works out OK.
Jumping Ahead: It did work, and it is only using about 10-12% of one A53 core when idle and just being a router, so ought to work well on small boxes too.
Next notice it will need 213 MB of added disk space. Make sure you have it.
Now the big plot complication is that the I2P web site says it’s a back level release unless you are on the testing release of Debian named SID. Well I generally don’t run “testing” releases. I’m running Buster, one back from “testing”. But they don’t say what, if anything, happens if you are running back level. Are the cryptographic keys expired so nothing works? Does it only work with other back level users in a 2 tier network? Does nothing at all really change? No idea… So of course I’m going to try it.
The apt-get run took just a couple of minutes and completed without complaint. Will it work, or need I do more? It DOES look like it handled some (all?) of the cert stuff needed:
[...] Adding debian:Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem Adding debian:TrustCor_RootCert_CA-1.pem Adding debian:UCA_Extended_Validation_Root.pem Adding debian:Buypass_Class_3_Root_CA.pem Adding debian:ACCVRAIZ1.pem Adding debian:GTS_Root_R4.pem Adding debian:Microsec_e-Szigno_Root_CA_2009.pem Adding debian:USERTrust_RSA_Certification_Authority.pem Adding debian:T-TeleSec_GlobalRoot_Class_2.pem Adding debian:COMODO_Certification_Authority.pem Adding debian:SSL.com_EV_Root_Certification_Authority_ECC.pem Adding debian:SecureSign_RootCA11.pem Adding debian:AffirmTrust_Networking.pem Adding debian:CFCA_EV_ROOT.pem Adding debian:Amazon_Root_CA_4.pem Adding debian:GeoTrust_Universal_CA_2.pem done. Setting up i2p (0.9.38-3.1) ... Creating config file /etc/i2p/wrapper.config with new version Processing triggers for libc-bin (2.28-10) ... Processing triggers for systemd (241-7~deb10u5) ... Processing triggers for man-db (2.8.5-2) ... Processing triggers for ca-certificates (20200601~deb10u1) ... Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. done. root@OdroidN2:/#
The Debian Wiki is rather out of date (last update 2015!), but has some useful bits in it. Bolded bits bolded by me.:
I2P is an security and anonymity network protocol, similar to TOR.
I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely.
Uses include anonymous web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P.
Installation on Debian is trivial and takes 5 minutes, though as of 2013-12/Wheezy it is not packaged in official Debian repository.
Update: installs and runs fine as service on testing/jessie. Web interface insists it´s firewalled, but daemon thinks it´s hunky-dory.
How ever, i2p developers do publish own Debian repository.
In future, ?Mempo project will include I2P as default application.
You need to install java runtime (java-jre) and then download java application-installer from https://i2p2.de and run this as user.
Some users would recommend to run such programs on separate user for better security, in such case adduser srv_i2p –disabled-password, su to this user, wget and run downloaded .jar file with command java -jar i2pinstall_0.9.9.jar -console (or other file name for other i2p version).
With I2P running you can for example:
connect to localhost (own computer) control panel as web page on: http://127.0.0.1:7657/
connect an IRC client like xchat or issi to it, e.g. irssi -c 127.0.0.1:6668 or start either and /connect 127.0.0.1 6668 and there you are on IRC2P the main IRC network inside I2P network which makes your IP connection private (invisible to other without special observation or attacks to uncover/correlate it).
* fell invited to join channel #debian
* fell invited to join channel #mempo about hardening Debian/computers as part of Mempo project
* popular channels include #i2p and #salt
use new web-browser profile (e.g. firefox –no-remote -P and there create profile) and in configuration – advanced – networking set proxy server for http to 127.0.0.1 port 4444 and for https same but port 4445. Then you can in this browser open protected i2p web pages, like http://zzz.i2p etc.
Download files from I2P
If you want to download any files from I2P you have to install and configure I2P (if you do not have it already) and next connect to I2PSNARK as web page on: I2PSNARK and next copy I2P magnet link like magnet:?xt=urn:btih:…=http://tracker2.postman.i2p/announce.php which we mark here often with I2P icon e.g. on SameKernel/Releases_and_Downloads and paste that link into “From URL” input box on your I2PSNARK web-panel and press “Add torrent”.
I2P (last modified 2015-02-20 08:29:32)
FWIW, when I “hit the link” to the 127.9.9.1:7657 page I get a nice “configure” panel, so looks like it installed and is happy. IFF it works too ;-) The first thing it does is ask what language I want to use. There’s a selection of 32 at the moment… A broad selection of European along with the major Asian languages, and Arabic, but a shortage of Afro-Asiatic and Native Americas languages, along with little from the Micronesia / Polynesia groups. Hebrew curiously lacking and Indonesian along with Malagasy as the Indo-Pacific island sort of tokens. One assumes the Israelis have their own system for privacy or use a non-native language, while the heavy representation of language from Muslim countries along with Chinese is due to their higher needs…
After picking a language, it then does an (optional) bandwidth test. After about a minute (that seems longer…) it shifts from “running” to “completed” and you press “next”… which gave me:
NEW INSTALL WIZARD 5/7
Bandwidth test failed
BANDWIDTH TEST RESULTS
Test running? false
Test complete? true
Test server location San Francisco Bay Area US ndt-iupui-mlab2-nuq02.mlab-oti.measurement-lab.org
Completion status No results were received. Either the test server is unavailable or network problems are preventing the test from running correctly. Please try again.
Details No results were received. Either the test server is unavailable or network problems are preventing the test from running correctly. Please try again.
I’m willing to bet that it didn’t get past the AT&T boundary router doing NAT. We’ll see if it works at all on actual target URLs after the configuration completes…
After a few more “next” clicks, the management panel comes up and informs me it thinks it is getting peers and likely working, so far…
I2P ROUTER CONSOLE
2/6/21 CONGRATULATIONS ON GETTING I2P INSTALLED!
Welcome to I2P! Please have patience as I2P boots up and finds peers.
While you are waiting, please adjust your bandwidth settings on the configuration page.
Also you can setup your browser to use the I2P proxy to reach eepsites. Just enter 127.0.0.1 (or localhost) port 4444 as a http proxy into your browser settings. Do not use SOCKS for this. More information can be found on the I2P browser proxy setup page.
Once you have a “shared clients” destination listed on the left, please check out our FAQ.
Point your IRC client to localhost:6668 and say hi to us on #i2p.
In a side panel it says:
Version: 0.9.38-0-3.1 Uptime: 28 min 3 Sec: 0.21 / 0.31 KBps 5 Min: 0.38 / 0.55 KBps Total: 0.47 / 0.87 KBps Used: 761 KB / 1.27 MB Network: Firewalled Restart Shutdown Client shared clients Ready Client shared clients (DSA) Ready
Given that there is “used” bandwidth, that implies it is doing something. UN-fortunately, Chromium doesn’t let me set the proxy on ARM Debian releases, so I’ve had to manually set it in FireFox to see if I can get to anything.
Where I got:
I2P Router Console Configuration Help Addressbook
The website was not reachable. The website is offline, there is network congestion, or your router is not yet well-integrated with peers. You may want to retry.
Could not find the following destination:
It has a nice little I2P logo / Icon in the message, so I’m pretty sure that I’ve connected to the I2P service, it is running, but something doesn’t love it. I’m suspecting the boundary router / NAT service. Yet my network status page claims I have 14 connections:
I2P NETWORK PEERS
CH FGm0 Inbound 14 sec / 15 sec 0.00 / 0.00 15 sec −804 ms 8K / 0 / 8 / 0 512K 1278 ms 6 sec 620 / 620 2 2 0 0
?? JkT8 Inbound 14 sec / 5 min 0.15 / 0.00 5 min −322 ms 9K / 0 / 8 / 0 512K 1164 ms 6 sec 620 / 1131 2 24 0 0
?? K0z0 Outbound 19 sec / 19 sec 0.00 / 0.00 7 min −300 ms 28K / 0 / 11 / 0 512K 729 ms 3 sec 1484 / 620 19 2 0 0
US L7UK Outbound 6 min / 35 min 0.00 / 0.00 41 min −313 ms 15K / 0 / 8 / 0 512K 982 ms 5 sec 1484 / 1484 4 46 0 0
US RC75 Outbound 4 min / 12 min 0.00 / 0.00 28 min 23 ms 46K / 0 / 10 / 0 512K 258 ms 530 ms 1484 / 620 36 3 0 0
?? VTNc Inbound 22 sec / 5 min 0.00 / 0.00 6 min −417 ms 8K / 0 / 9 / 0 4K 1201 ms 6 sec 620 / 1145 3 13 1 0
RU ZVLK Outbound V 20 sec / 20 sec 0.00 / 0.00 40 min −126 ms 76K / 0 / 13 / 0 512K 450 ms 642 ms 1484 / 1484 64 61 0 0
US fZ4b Inbound 4 min / 4 min 0.00 / 0.00 6 min −421 ms 9K / 0 / 8 / 0
So no clue why nothing seems to be working…
Some Hour Or Two Later….
The problem was traced to the browser configuration. One of these was the issue, but I don’t know for sure which one.
1) I had to put 127.0.0.1 port 4444 in for HTTP and HTTPS proxy. But that was not sufficient.
2) I had to go into about:config and set it to use a proxy always. But that was not sufficient.
3) Also in about:config I turned on the use of DNS via the browser (i.e. ignore my DNS server). This was likely the culprit.
4) I went back and discovered that when I’d shut off MY Proxy server entries in the config, network page, it auto-filled in MY proxy server address in the Socks Proxy also. One needs to TURN OFF Socks proxy. After I blanked the entry in Socks Proxy, (and I did FTP proxy while I was there), everything suddenly worked.
I do not know if #3 is necessary as the SOCKS proxy was set at that time, but I’m pretty sure it is essential, otherwise looking up “eepsites” (things ending in .I2P and only on I2P network) ought to fail as MY DNS server doesn’t know about them…
This was helpful in realizing the SOCKS issue:
@eyedeekay on github
edited 6 days ago
Port 4444 is an HTTP Proxy, not a SOCKS proxy. I do not know how to make that simpler to understand, if you configure your browser to use 4444 as a SOCKS proxy it absolutely will not work. As I said in the other thread, you have now set up a SOCKS proxy on a privileged port that your OS will not let you open. Ports less than 1000 are restricted for use by OS-essential programs, you have to ask to use them(sudo). No where on that page does it suggest using a SOCKS proxy. The screenshot only shows that because that is exactly what it looked like in the Firefox UI after I configured the HTTP proxy and took the screenshot.
There is no such thing as a main tunnel. If you want to set up browsing over the SOCKS proxy tunnel you have set up, then change 4444 to the SOCKS proxy port you choose when you re-attempt to set up your SOCKS proxy on a port greater than 1000. Now that you will actually be using a SOCKS proxy, you may configure your browser as such.
Please, for your own sake, stop trying to use a SOCKS proxy. You are making things so much harder for yourself. Just follow the basic instructions to set up browsing with the built-in, longstanding, tested HTTP proxy.
I’d not gone out of my way to configure a SOCKS proxy, but when I clicked OFF the “use proxy for all that stuff below” button, it was filled in for me as MY proxy server address. I then proceeded to set the HTTP and HTTPS values, but simply paid no attention to the SOCKS proxy setting as I typically don’t do anything but click the “use for all” radio button… OK, I know know to watch it…
Very useful for the general guidance on setting up your browser. A key bit:
Finally, go to the address about:config and find the property media.peerConnection.ice.proxy_only. Ensure that this setting is True.
I now have a working 12P install on my computer, AND I’m getting to the hidden “eepsites” on the I2P overlay network. The I2P install was nearly trivial, and the bulk of my time and troubles were in configuring my browser to use it.
It is an advantage to have 2 browsers installed, one for the Regular Internet and one for the I2P Privacy Network. On ARM Chips, Chromium is reluctant to let you properly set a proxy server, so you get to use FireFox for the I2P network (or go down the “how to whack on Chromium rabbit hole…).
I’m happy to have FireFox be for I2P and Chromium be for the public internet.
The Big Deal
In all of this the big deal is that I2P has a LOT of privacy and anonymity services. With it, alone, you have opened a way to do most of what most folks want to do. Having looked at all the various P2P (Peer to Peer) and F2F (Friend to Friend) applications and services under the FreedomBox (and others) I believe this is the best one to start with to get the most “bang for the buck” of installation time and effort. It has a HUGE installed base of participants (on the order of 50,000) so contact tracing is nearly impossible. It has a lot of services. And it is already essentially built in to Debian (and becoming more so every release).
If you want to look around and see what’ out there, there is a special search engine just for that:
how to tweet anonymously? – Hidden Answers
View Webpage Cached
how to tweet anonymously? – Hidden AnswersI want to know how to tweet someone without using my twitter account, I tried the clearnet stuff but nothing really works. Login Register Hidden Answers
Cryptic Trump tweet…
View Webpage Cached
Cryptic Trump tweet… Jump to main content Jump to sidebar [RAMBLE] Forums Wiki Log in Sign up /f/ conspiracy Cryptic Trump tweet… Submitted by MrBlack on December 11, 2020 at 10:46 PM in
Penny Arcade 2009-10-21: The Glass Tweet
View Webpage Cached
Penny Arcade 2009-10-21: The Glass Tweet recent messages all channels rss What is this? Penny Arcade 2009-10-21: The Glass Tweet Posted by Anonymous in Comics on 2009-10-21 page 1 attachment 1
Sky (@SkyUK) | VxEmpire Nitter
View Webpage Cached
Sky (@SkyUK) | VxEmpire NitterAll the latest from Sky TV. For customer assistance, tweet @SkyHelpTeam VxEmpire Nitter Sky @SkyUK All the latest from Sky TV. For customer assistance, tweet
Note that you can reach sites by a very short name in regular text, or by a long cryptic handle. That’s the string of stuff in those names. I2P has a built in way to remember those for you, though I’ve not explored it yet, so it isn’t like you need to remember or type them ;-)
If you don’t want to do the search and hunt exploration, there’s a guide for NOOBS (and others…):
Note that “eepsites” is what I2P darkweb sites are called.
The Hitchhiker’s Guide to the I2P eepsites
Jan 23, 2019·6 min read
So you are interested in I2P. After installation and some setup, the biggest question would be, what’s next? what can I do with I2P?
There are lots of things you can do with I2P, and one of the nice things is running and browsing “eepsites”. Eepsites are websites in the I2P network, which have .i2p pseudo TLD, only accessible via I2P. You can run eepsites anonymously, and you can browse eepsites anonymously, too. Your identity information is supposed to be lost in onion/garlic routing, so you will not be tracked down by anyone else (at least theoretically). Eepsites are similar to Tor’s Hidden Services.
Some time ago, I wrote about how to run eepsites. I have also covered how to browse eepsites. This time, let’s find out interesting eepsites and have some fun.
As I explained before, in the world of I2P, human-readable addresses (like retrobbs.i2p in this example) are optional. The b32 addresses or longer Destinations are canonical (and can be used all the time). Sometimes you have to register b32 addresses/Destinations for human-readable addresses to your I2P router by hand.
I2P is a pillar of the so-called dark web, along with Tor and Freenet. Generally speaking, the contents in dark web are not indexed by standard web search engines such as Google. However, non-standard web search engines can handle it.
There are many special search engines for Tor onionland. One of the most well-known would be Ahmia. But until recently, there were none for I2P eepsites.
Legwork/Ransack are my own recent efforts. Legwork.i2p (b32 address) is a search engine specialized in the I2P network. It only indexes eepsites. No .onions, no clearnet websites.
Sometimes we want to ask questions. Maybe embarrassing questions. Or, maybe you want to reply embarrassing answers. I2P provides a way for it.
Hidden Answers (b32 address) is a great place to ask questions. It features very clean and intuitive user interface. There are also Russian version (b32 address), Spanish version (b32 address) and Portuguese version (b32 address) available.
Good microblogging service in I2P is one of the missing links in the I2P world. Still, there exsts an eepsite called Visibility (b32 address). A bit slow and shaky, it works nevertheless.
Running Mastodon instances or similar inside I2P is possible (and not so difficult, actually). It will give us a completely anonymous, distributed Twitter clone. Does anyone take a dare?
Note that “microblogging” is the generic for the service commonly called a “tweet”…
You can also set up hidden censorship free Web Sites:
And a whole lot more.
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a Mix Network) that allows for censorship resistant, peer to peer communication. Anonymous connections are achieved by encrypting the user’s traffic (by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an “I2P router”, and a computer running I2P is called an “I2P node”. I2P is free and open source, and is published under multiple licenses.
So if you need to “tweet”, blog, run a web site, or just chat, you can do it privately and free of censorship.
I2PTunnel is an application embedded into I2P that allows arbitrary TCP/IP applications to communicate over I2P by setting up “tunnels” which can be accessed by connecting to pre-determined ports on localhost.
SAM (Simple Anonymous Messaging) is a protocol which allows a client application written in any programming language to communicate over I2P, by using a socket-based interface to the I2P router.
BOB (Basic Open Bridge) is a less complex app to router protocol similar to “SAM”
Orchid Outproxy Tor plugin
Any IRC client made for the Internet Relay Chat can work, once connected to the I2P IRC server (on localhost).
Several programs provide BitTorrent functionality for use within the I2P network. Users cannot connect to non-I2P torrents or peers from within I2P, nor can they connect to I2P torrents or peers from outside I2P. I2PSnark, included in the I2P install package, is a port of the BitTorrent client named Snark. Vuze, formerly known as Azureus, is a BitTorrent client that includes a plugin for I2P, allowing anonymous swarming through this network.
Two Kad network clients exist for the I2P network, iMule and Nachtblitz. iMule (invisible Mule) is a port of eMule for I2P network. iMule has not been developed since 2013. iMule is made for anonymous file sharing. In contrast to other eDonkey clients, iMule only uses the Kademlia for proceeding to connect through I2P network, so no servers are needed. Nachtblitz is a custom client built on the .NET Framework. The latest version is 1.4.27,
MuWire is a file-sharing program inspired by the LimeWire Gnutella client that works atop the I2P network.
A screenshot of the inbox of I2P-Bote.
I2P-Bote(github) is a free, fully decentralized and distributed anonymous email system with a strong focus on security. It supports multiple identities and does not expose email metadata.
I2P also has a free pseudonymous e-mail service run by an individual called Postman. Susimail is a web-based email client intended primarily for use with Postman’s mail servers, and is designed with security and anonymity in mind. Susimail was created to address privacy concerns in using these servers directly using traditional email clients, such as leaking the user’s hostname while communicating with the SMTP server. It is currently included in the default I2P distribution, and can be accessed through the I2P router console web interface. Mail.i2p can contact both I2P email users and public internet email users.
I2P-Messenger is a simple Qt-based, serverless, end-to-end-encrypted instant messenger for I2P. No servers can log the user’s conversations. No ISP can log with whom the user chats, when, or for how long. As it is serverless, it can make use of I2P’s end-to-end encryption, preventing any node between two parties from having access to the plain text. I2P-Messenger can be used for fully anonymous instant communication with persons the user doesn’t even know, or, alternatively, to communicate securely and untraceably with friends, family members, or colleagues. In addition to messaging, file transfer is also supported.
I2P-Talk is another simple instant messenger incompatible with I2P-Messenger, but having the same security properties
Syndie is a content distribution application, suitable for blogs, newsgroups, forums and small media attachments. Syndie is designed for network resilience. It supports connections to I2P, the Tor network (Syndie does not support Socks proxies, workaround needed for Tor access), Freenet and the regular internet. Server connections are intermittent, and support higher-latency communications. Connections can be made to any number of known servers. Content is spread efficiently using a Gossip protocol.
Aktie is an anonymous file sharing and distributed Web of trust forums system. Aktie can connect to I2P with its internal router or use an external router. To fight spam, “hash payments” (proof of CPU work) is computed for every published item.
I2PBerry is a Linux distribution which can be used as a router to encrypt and route network traffic through the I2P network.
i2pd is a light-weight I2P router written in C++, stripping the excessive applications such as e-mail, torrents, and others that can be regarded as bloat.
The Privacy Solutions project
The Privacy Solutions project, a new organization that develops and maintains I2P software, launched several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.
These efforts include:
The Abscond browser bundle.
i2pd, an alternate implementation of I2P, written in C++ (rather than Java).
The “BigBrother” I2P network monitoring project.
The code repository and download sections for the i2pd and Abscond project is available for the public to review and download. Effective January, 2015 i2pd is operating under PurpleI2P.
I2P running on Android.
Release builds of an I2P Router application for Android can be found on the Google Play store under The Privacy Solutions Project’s Google Play account or on an F-Droid repository hosted by the developers.
Nightweb is an Android application that utilizes I2P and Bittorrent to share blog posts, photos, and other similar content. It can also be run as a desktop application. It is no longer in development.
Some crypto currencies that support I2P are listed below.
As those things listed cover most of anything I’d ever need to do, I figured this was the best place to start. From communications to file sharing and even to payments via a minor crypto currency, it covers a lot of turf.
And, with that, now that I’m “On the dark web”, I think I need to do something with it ;-)
Hopefully this little tutorial will help folks get started too. When I have more, I’ll talk it up here. FWIW, I’m planning my next step to be a “do over” of this install and bring up process, but on a Raspberry Pi Model 3 with Devuan or a Debian port. Once that’s working reasonably well, I intend to move it to my TV Network and just leave it running as a router / gateway service to the I2P network.
While I’m pretty sure these folks have carefully kept Bad Stuff from being able to “crawl up the wire” and I’m willing to trust that while I’m at the keyboard and have HTOP to watch for unexpected activity, I’m not willing to leave it up and running for days (and nights…) on the house network.
But that’s for later…right now I’m going exploring! (Well aware that lack of policing in a privacy and anonymity network also means Bad Guys can set up phishing sites too… so after tepid and careful exploring, I’m making that Pi Box for more “interesting” poking around ;-)