Files
idk.i2p/index.html
2020-01-06 19:40:49 -05:00

97 lines
4.7 KiB
HTML

<!DOCTYPE html>
<html>
<head>
<title>I2P Browser Configurations and their Attackability</title>
<link rel="stylesheet" type="text/css" href ="style.css" />
</head>
<body>
<h1>idk's home page</h1>
<p>I like to make peer-to-peer things, and think we should structure the future in
a way which builds in privacy by default in a maximally peer-to-peer way.</p>
<h2>Projects:</h2>
<p>Besides working on <a href="https://geti2p.net/">I2P</a>, I have a bunch of side-projects
centered around the use of I2P, especially in Go and Javascript. Some of these
are also I2P labs projects.</p>
<h3>I2P Webextensions and Browser Research</h3>
<ul>
<li><a href="https://eyedeekay.github.io/I2P-in-Private-Browsing-Mode-Firefox/">I2P in Private Browsing Mode for Firefox</a>
inspired by Brave, this browser extension enforces a few privacy rules for
Firefox, then implements a set of "Container Tabs" which can be used to browse
I2P in a way which is automatic and safe.</li>
<li><a href="https://eyedeekay.github.io/I2P-Configuration-For-Chromium/">I2P Configuration Helper for Chromium</a>
A fork of the Firefox plugin before it used container tabs, after the user sets
up an I2P browsing profile this plugin can automatically set up the profile to
use I2P with the maximum privacy available from Chromium.</li>
<li><a href="https://eyedeekay.github.io/I2P-Browser-Attackability-Evaluation/">I2P Browser Fingerprint Gallery</a>
This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them.</li>
</ul>
<h3>Go(golang) I2P Tools</h3>
<ul>
<li><a href="https://github.com/eyedeekay/sam-forwarder">samcatd</a>, a.k.a. sam-forwarder
many of the other applications use sam-forwarder as a way of automatically
configuring i2ptunnels, including:
<ul>
<li><a href="https://github.com/eyedeekay/httptunnel">httptunnel</a> is a standalone http
proxy for I2P that uses SAM and implements an interface like sam-forwarder.</li>
<li><a href="https://github.com/eyedeekay/eephttpd">eephttpd</a> is a simple static http
server with markdown parsing support.</li>
<li><a href="https://github.com/eyedeekay/gitsam">gitsam</a> is a super-simple git
repository setup built on eephttpd and <a href="">gitkit</a>.</li>
<li><a href="https://github.com/eyedeekay/reposam">reposam</a> is a binary deb repository
built on <a href="">repogen</a>.</li>
<li><a href="https://github.com/eyedeekay/samtracker">samtracker</a> is a simple torrent
tracker built upon <a href="">retracker</a>.</li>
<li><a href="https://github.com/eyedeekay/cowyosam">cowyosam</a> is a pastebin-wiki hybrid
built on <a href="">cowyo</a></li>
<li><a href="https://github.com/eyedeekay/colluding_sites_attack">colluding<em>sites</em>attack</a>
is a tool for fingerprinting browsers as they visit eepSites to determine if
useful information can be extracted.</li>
<li><a href="https://github.com/eyedeekay/outproxy">outproxy</a> is a standalone outproxy
built on SAM. Definitely don't use it if you don't know what you're in for.</li>
<li><a href="https://github.com/RTradeLtd/libanonvpn">libanonvpn</a> is a VPN library and
terminal application that uses SAM Datagrams. Sort of like onioncat, but
cooler.</li>
</ul></li>
<li><a href="https://github.com/eyedeekay/checki2cp">checki2cp</a> is an I2P router presence
detection tool. Use it to find out if an I2P router is installed.</li>
<li><a href="https://github.com/eyedeekay/goSam">goSam</a> is a SAM library for Go that
implements an HTTP Transport.</li>
<li><a href="https://github.com/eyedeekay/i2pdig">i2pdig</a> is dig, but for I2P. It's been
a while, I'll update it soon.</li>
<li><a href="https://github.com/eyedeekay/iget">iget</a> iget is an eepget clone, with some
extra features and room to grow.</li>
<li><a href="https://github.com/eyedeekay/keyto">keyto</a> is a text key conversion tool.</li>
<li><a href="https://github.com/eyedeekay/sam3">sam3</a> is another SAM library for Go, but
it implements a net.Conn and net.Packetconn making it a near drop-in
replacement for regular connections.</li>
</ul>
<h2>Blog:</h2>
<h4>Sun Nov 26 03:21:12 EST 2017</h4>
<p>Hi. This is the blog where I'm going to document all the wierd stuff I do on my
home network. I'm most passionate about the areas where I am relatively free of
constraints, and for me, that is in hobby computing in my own home. But since
it's not a place with an IT staff and other organizational resources, I
sometimes do wierd, ill-advised things to get my computers just the way I like
them.</p>
<p>Also I'm pretty bad at blogging.</p>
<h4>Mon Jan 22 12:41:21 EST 2018</h4>
<p>Getting nervous, about to flash an up-to-date coreboot port to my netbook via
a ch341a flasher. I'm about 99% sure I'm not going to hurt anything, but who
knows?</p>
</body>
</html>