How I Run Darknets From My Home Internet (Feds are SEETHING)

Sdílet
Vložit
  • čas přidán 16. 12. 2021
  • In this video I show you how I run different darknets (tor and i2p) from my home network.
    geti2p.net/en/comparison/tor
    github.com/PurpleI2P/i2pd
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
    Dash
    Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
    Zcash
    t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
    Chainlink
    0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
    Bitcoin Cash
    qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
    Etherum Classic
    0xeA641e59913960f578ad39A6B4d02051A5556BfC
    USD Coin
    0x0B045f743A693b225630862a3464B52fefE79FdB
    Subscribe to my CZcams channel goo.gl/9U10Wz
    and be sure to click that notification bell so you know when new videos are released.
  • Věda a technologie

Komentáře • 349

  • @winterland3253
    @winterland3253 Před 2 lety +2536

    mental outlaw has been providing such solid tutorials lately that I'm beginning to suspect he's a fed honeypot

    • @No-uc6fg
      @No-uc6fg Před 2 lety +629

      What if the real honeypot were the friends we made along the way?

    • @nkonkonko
      @nkonkonko Před 2 lety +184

      this is the hot fed they warned us about

    • @paulspl2581
      @paulspl2581 Před 2 lety +103

      That's why the videos of his face all look fake. They're all AI generated

    • @jamess1787
      @jamess1787 Před 2 lety +82

      Fed 100%.
      But a really cool glasses-wearing Chad. 🕶️🤳

    • @N.S.A.
      @N.S.A. Před 2 lety +102

      I agree. 100% Fed.

  •  Před 2 lety +136

    Didn't expect to be peer pressured into running a tor node

  • @aetheralmeowstic2392
    @aetheralmeowstic2392 Před 2 lety +115

    You know what, the P2P online functionality of my planned Pokémon fan games will be run through I2P.

  • @nnaaaaaa
    @nnaaaaaa Před 2 lety +266

    i2p is stored in the balls.

  • @FoxMaccloud
    @FoxMaccloud Před 2 lety +57

    Litterly just finished setting up a new tor relay on an old desktop from 2008 that I saved from the landfills xD

  • @idklol4197
    @idklol4197 Před 2 lety +758

    the virgin mental outlaw: i have darknets running on my own private server, my pc has custom coded lynooks kernel, and im behind 300 proxies.
    the chad CIA: haha how do i open pdf

    • @N.S.A.
      @N.S.A. Před 2 lety +97

      😆

    • @purplep3466
      @purplep3466 Před 2 lety +24

      pin this comment, mr. Virgin Mental Outlaw

    • @spark198rus
      @spark198rus Před 2 lety +19

      Lynooks LOL

    • @iselink
      @iselink Před 2 lety +9

      Actualy this maybe is true as a lot of peoples don't know how to do basic tasks.

    • @cia3653
      @cia3653 Před 2 lety +28

      accurate

  • @hughjanus8003
    @hughjanus8003 Před 2 lety +285

    I love how a gentoo user says “arch btw” when using arch, but just seems to consider gentoo a normal thing

    • @gideonfelt2819
      @gideonfelt2819 Před 2 lety +21

      Did you know ChromeOS is Gentoo based too? Just an interesting fact.

    • @hughjanus8003
      @hughjanus8003 Před 2 lety +1

      @@gideonfelt2819 why?

    • @marcopeterson805
      @marcopeterson805 Před 2 lety +53

      @@hughjanus8003 gentoo is based

    • @totallynotbluu
      @totallynotbluu Před 2 lety +1

      @@hughjanus8003 cause why not

    • @hughjanus8003
      @hughjanus8003 Před 2 lety +3

      @@totallynotbluu i meant it like why would gentoo be a better option for chrome os than other distros lmao

  • @Dobrouh
    @Dobrouh Před 2 lety +12

    Kudos for the subtle "BTW I use Arch" that you snuck in there

  • @nkonkonko
    @nkonkonko Před 2 lety +26

    DAD it's 4 in the morning and i'm here, ready lmfao

  • @RmFrZQ
    @RmFrZQ Před 2 lety +89

    Now that TOR network is blocked in Russia by government, I2P network and self-hosted VPN service on VPS are the only options to fight against censorship.

    • @ZVLIAN
      @ZVLIAN Před 2 lety +19

      Oh shit, Isnt russia like THE place for torrents, piracy and stuff?

    • @RmFrZQ
      @RmFrZQ Před 2 lety +23

      @@ZVLIAN Well, yes and no. The famous and reputable torrent trackers were blocked by ISPs a few years ago, but just recently TOR networks were also blocked, because they were commonly used by people to fight against censorship enforcement and government surveillance. The torrent trackers are not going anywhere AFAIK for the rest of the world. TOR blockade just made more difficult to access them from Russia.

    • @nathanl2966
      @nathanl2966 Před 2 lety +5

      Don't forget IPFS.

    • @0xva
      @0xva Před 2 lety +9

      Wouldn't tor bridges help with that?

    • @RmFrZQ
      @RmFrZQ Před 2 lety +4

      @@SkyenNovaA yes, bridges work until they become individually blocked by ISPs. The process to get new bridges IPs is complicated, when you don't have access to Tor project website via "clear net".

  • @OGPimpin
    @OGPimpin Před 2 lety +80

    Dude, you are a life saver. Ive been wanting to connect to i2pd for years, but was a bit skeptical based on how complicated it could get to set it up. Now its time to take care of business

    • @cagneybillingsley2165
      @cagneybillingsley2165 Před 8 měsíci

      feds don't care because you're not doing anything that's really illegal or disruptive. they only care if there is physical tangible consequences to their monopolies on force, ideas, money, etc. ideas on the darknet are easily counteracted with tons of media propaganda

  • @c4llv07e
    @c4llv07e Před 2 lety +9

    Yay! MO is talking about i2p and i2pd in general!

  • @MrCrabs231
    @MrCrabs231 Před 2 lety +25

    "It's the deep web so you know that lain is gonna be posted everywhere"

  • @LeDechaine
    @LeDechaine Před 2 lety +37

    Thanks for this, I went from 26% ram use to 2.6% ram use by switching to i2pd!
    Also did not know about ssh tunneling, really helpful.

  • @ranaakhil
    @ranaakhil Před 2 lety +56

    Thanks for the incredible guide.
    But thing about running relays at home is most ISPs now a days provide dynamic IPs which are behind Carrier Grade NATs and they don't allow port forwarding. :(

    • @cleitonfelipe2092
      @cleitonfelipe2092 Před 2 lety +10

      True, but you can ask. Say that you are playing a new game and want to create a server and need port 4444 or whatever

    • @matthewsoules7064
      @matthewsoules7064 Před rokem +7

      Say you wanna play a RuneScape private server...sounds cheesy as fuck but that's a very popular thing

  • @gideonfelt2819
    @gideonfelt2819 Před 2 lety +7

    This is awesome, wish it grows to tor level popularity.

  • @fatguybob2778
    @fatguybob2778 Před 2 lety +6

    Started college for Cybersecurity this year and I absolutely love this community! Woohoo info sec 4 life

  • @chrisjones2737
    @chrisjones2737 Před 5 dny

    I just started college for computer science, I’m trying to understand the different buzz words and dark net was one. Good explanation

  • @crepituss9381
    @crepituss9381 Před 2 lety +2

    I haven't used lynx for at least 15 years. Glad it's still around.

  • @xcat4775
    @xcat4775 Před 2 lety +1

    yikes ssh makes me nervous. Been thinking about running i2P lately though. Good to hear about it

  • @Zerao98
    @Zerao98 Před 2 lety +128

    Correct me if I'm wrong but upnp can be a security vulnerability, why would you enable it? upnp should be off (already at the router).

    • @MentalOutlaw
      @MentalOutlaw  Před 2 lety +72

      afaik there were some insecure implementations of it on older router firmware, it would also make it easier for malware to spread to other devices if one becomes compromised.

    • @Zerao98
      @Zerao98 Před 2 lety +28

      @@MentalOutlaw
      Seems like something you wanna have off if you're going for security. I found this in one source (upguard), it says:
      To prevent such infectious connections from occurring, the entire attack surface associated with a UPnP connection must be kept updated with the latest patches. This includes routers, firewalls, antivirus software, and all IoT devices that are to be connected.

    • @surewhynot6259
      @surewhynot6259 Před 2 lety

      @@Zerao98 it's only a concern if unsecure programs open ports on it

    • @Zerao98
      @Zerao98 Před 2 lety +11

      @@surewhynot6259 someone might have a school or work laptop on the network, or just litterally any guest with wifi access. Any of those could lead a problem. There's literally no reason to enable upnp, if you go all the way tor/i2p kind of thing.

    • @w1z4rd9
      @w1z4rd9 Před 2 lety +1

      @@Zerao98 Oh that one where the Russians made the FBI warn the people of it.

  • @krypek940
    @krypek940 Před 2 lety

    best tech chanel + love your voice

  • @TheBenSanders
    @TheBenSanders Před rokem

    lmao switching to the terminal tab with the neofetch pulled up was really funny.

  • @0x007A
    @0x007A Před 2 lety

    To improve online safety from surveillance setup your own VPN service on a VPS, from there connect to another VPS hosting your I2P node and/or Tor middle or exit node.

  • @wonyoung2523
    @wonyoung2523 Před 2 lety +2

    I got a US marine corps ad before this video started.

  • @metie10
    @metie10 Před 2 lety +4

    yo mental outlaw, can you make an indepth video about hosting a very safe and anonymous tor website. great vids

  • @Anthony-cn8ll
    @Anthony-cn8ll Před 2 lety +9

    The biggest thing that prevents hosting from home is assymetric speeds where you might get 1000 Mbps down but only 40 Mbps up. If you want any more then it has to be a prohibitively expensive business account. i2p is great because of the P2P structure, so hosting isn't as painful.

    • @dalethomasdewitt
      @dalethomasdewitt Před 2 lety

      Advanced smrs were retrofitted to all metropolitan areas. Industry prospered: extreme bandwidth for cheap became the norm. AI controlled businesses allowed a new form of democracy. A bitcoin inexpensively powered ..
      .. allowed only the great things about nation states to replicate amounst the human civilization.

  • @wmdtone
    @wmdtone Před 2 lety

    Very cool vid, thanks

  • @georgecaveington1661
    @georgecaveington1661 Před 2 lety +13

    It's safe to SSH tunnel over the internet because SSH is encrypted so the tunneled traffic will also be encrypted.

    • @curlybeckster288
      @curlybeckster288 Před 2 lety +7

      Yeah, this is what I was thinking. As long as I2P is configured to not allow connections to its web console using its public ip addresses, then it should be fine.

  • @SacGeoTV
    @SacGeoTV Před 2 lety +25

    Gods Bless You - give em HELL 👹

  • @Cookiekeks
    @Cookiekeks Před 2 lety +2

    Can you please make a video about the Lokinet? It's another onion routing network, made by the devs of Session (private messenger).

  • @ebfromtha410
    @ebfromtha410 Před 2 lety +2

    Gotta love that pc name

  • @matthewgoodwin8206
    @matthewgoodwin8206 Před 2 lety +17

    Noob question: if in the Tor network each node is responsible for encrypting and decrypting the same layer of protection then that should mean that each decryption key is stored offline and only useable by the node responsible for that layer. However in the i2p network different servers are responsible for encryption and decryption. Does that mean that the encryption key has to be sent across the web to another server? This seems like a security vulnerability.

    • @radman4049
      @radman4049 Před 11 měsíci +2

      Tor Network:
      In the Tor network, the traffic between nodes is encrypted in multiple layers (onion layers), and each node in the chain only decrypts one layer, revealing the next node's identity to which the traffic should be sent. This allows each node to only know about its immediate predecessor and successor, enhancing privacy. Each node is aware only of its part in the route, which is determined by the circuit established when the user connects to the network.
      I2P Network:
      In the I2P network, the routing is done differently. Instead of the onion routing used in Tor, I2P uses a "garlic routing" scheme. In garlic routing, messages are bundled together in garlic cloves, each with its own encryption layer. Each node removes one layer of encryption and then forwards the remaining clove to the next node. Unlike Tor, where each node knows only about its predecessor and successor, I2P nodes have knowledge of the entire route, making it different in terms of anonymity characteristics.
      In the case of I2P, because each node knows the entire route, it's true that the encryption key has to be sent across the network. However, the encryption keys are encrypted themselves, and multiple layers of encryption provide security. The nodes are trusted to properly forward the encrypted data without revealing the content.
      While the differences in encryption and routing between Tor and I2P have led to various discussions regarding their security properties, it's important to note that both networks have their own design philosophies and trade-offs. Both networks strive to provide anonymity and privacy for users, but their approaches and security models are distinct.
      Security vulnerabilities can exist in any system, and network design choices can impact the potential attack vectors. It's crucial for the developers of these networks to carefully consider security implications and continually improve their protocols based on the latest research and understanding of potential risks.

  • @potentwater2260
    @potentwater2260 Před 2 lety +3

    Don’t understand anything, but enjoy the good content.

  • @AJKvideoproductions
    @AJKvideoproductions Před 2 lety

    Super useful video

  • @CaptZenPetabyte
    @CaptZenPetabyte Před 2 lety +8

    If there were a way to make Tor exit nodes 'safer' then I am sure we could all just shove a docker container up, same for I2P... maybe that is the solution, so that if someone comes to mash it down a container would be easier to 'self destruct' and defunct the node?

    • @salpertia
      @salpertia Před 10 měsíci

      I know that the container exists but you look stupid deleting it only for them to know it came from your address.
      Not to mention your CZcams watch history confirms you are tech literate

  • @bin4rym4ge
    @bin4rym4ge Před rokem +1

    Almost can't believe this actually works. Never knew you could port forward through ssh like that, super fun.
    God bless.

  • @VivekYadav-ds8oz
    @VivekYadav-ds8oz Před 2 lety +4

    Can anybody please explain why we don't have arbitrary no. of user-chosen proxies in either Tor or I2P? If we didn't select nodes as belonging to one of the three layers, but just general proxies, we can implement this. What's the programmatic/algorithmic/design difficulties that prevent this from being done?

    • @LiberOpine
      @LiberOpine Před 2 lety

      I don’t think it’s possible to do without the nodes you are connecting to knowing how many relays deep you are which can be used to differentiate you from other users. In a predefined number of nodes, the first node knows that it will always send your data to an arbitrarily chosen second node and vice versa.

  • @MageAtYou
    @MageAtYou Před rokem

    How would you go on about setting up guerilla darknet exit route? Im thinking raspberry pi connected hidden somewhere connected to power and a local wifi. Thats the stuff tor needs!

  • @24680kong
    @24680kong Před 2 lety +1

    Thank you Based IT Guy.

  • @xtremememestv1717
    @xtremememestv1717 Před 11 měsíci

    ur my hero bro

  • @sillysausage231
    @sillysausage231 Před 2 lety

    I hecking love watching this with exactly zero idea what the fuck is going on :)

  • @DoingFedTime
    @DoingFedTime Před rokem +7

    As someone who was a darknet admin, vendor, and buyer - then fought the feds in court. The feds don't care it's a job for them.

  • @triularity
    @triularity Před rokem +1

    I'm not sure why ssh forwarding a port over the internet would be an issue. It's no less secure than ssh-ing into a server shell over the internet. Everything is [suppose to be] encrypted. 🤔

  • @foxtailedcritter
    @foxtailedcritter Před 2 lety +1

    Just like McDonald's I'm Lovin' this.

  • @eddiehazard3340
    @eddiehazard3340 Před 2 lety +19

    Hi Mental Outlaw, I love your channel. I thought I'd suggest you might want to change the title of this one - if legislation changes and they decide you are doing something illegal, this title could be damning in a later trial. Thanks very much for all the info you give us. I gave you a thumbs-up/like !

    • @cleitonfelipe2092
      @cleitonfelipe2092 Před 2 lety +18

      BS. The date is previous to the supposed future law and it doesn't work retroactively to punish.

    • @eddiehazard3340
      @eddiehazard3340 Před 2 lety +15

      @@cleitonfelipe2092 You're insane. They look at peoples social media all the time to prove "intent". You're simply wrong.

    • @joeh6346
      @joeh6346 Před 2 lety +3

      ​@@eddiehazard3340 This needs to be decided, both comments have the same likes and I want to know what is the correct thinking here.

    • @FirstLast-fl7mo
      @FirstLast-fl7mo Před 2 lety +1

      @@joeh6346 Social media aswell as local files will provide a very good insight into the mind of someone.

    • @Angel-yp6nl
      @Angel-yp6nl Před rokem

      @@eddiehazard3340 with enough money, you can do anything

  • @qm3ster
    @qm3ster Před 2 lety +1

    Is it really not possible to persist I2P state over a reboot?
    What about internet dropping out?

  • @TheCrowSpy
    @TheCrowSpy Před 2 lety +9

    If I2P sends client functions also (kinda) as a router, wuoldn't it be easy to sinff relayed data?

    • @c4llv07e
      @c4llv07e Před 2 lety +8

      It's complicated, but no. i2p was created with the idea that all transition nodes are compromised.

  • @NModem
    @NModem Před 2 lety

    I got recommended this but don't know what it is, did a quick read, is it like seeding but for the Tor network?

  • @mskiptr
    @mskiptr Před 2 lety +19

    Why would tunneling some port over SSH be unsafe? I mean the point of these tunnels is to make it safe, isn't it?

    • @Zaptosis
      @Zaptosis Před 2 lety +1

      ip

    • @hanelyp1
      @hanelyp1 Před 2 lety +5

      It would not be the ssh part that's a problem, but exposing the port to someplace it was not otherwise accessible.

    • @mskiptr
      @mskiptr Před 2 lety +5

      @@hanelyp1 But the forwarded port is accessible only on the loopback interface

  • @DiegoLinde
    @DiegoLinde Před 2 lety +3

    Can you cover Lokinet, please?

  • @ejonesss
    @ejonesss Před 2 lety +9

    how safe are we on i2p since you act like a torrent and you become (possibly an exit node) from the feds?
    can the feds get you on the activity to certain web sites that are requested based on the urls despite the content being encrypted
    how good is your plausible deniability? (oh i dont know anything about the sites that you claim i am accessing)
    at least with tor you are NOT handling others traffic because by default the relaying and exit node is disabled so you should be safer on tor when visiting safer sites

    • @aryan_5271
      @aryan_5271 Před 4 měsíci

      The FEDs and the Government already know about this stuff, it's the common folk (who intrude into your privacy) that you need to guard against.

  • @guiAI
    @guiAI Před 2 lety

    Why should i do this? Is there any benefit for me other than improving the network?

  • @olokelo
    @olokelo Před 2 lety

    Does anyone know what kind of network traffic speed should I be able to achieve as a i2p router?

  • @barrdack
    @barrdack Před 2 lety +8

    This channel is a honey pot :D

  • @egg5474
    @egg5474 Před 2 lety

    Chief, do you mind telling me what you’re doing on board that Onion?

  • @user-in2jf7tx1q
    @user-in2jf7tx1q Před měsícem

    old classic little project to do after high school

  • @bubbleboy821
    @bubbleboy821 Před 2 lety +1

    Cover lokinet I can't believe you haven't done a video on it yet

  • @im1random263
    @im1random263 Před 2 lety

    Why use a ssh tunnel instead of just connecting to the local ip address of the pi?

  • @FloFaber
    @FloFaber Před 2 lety

    Why would you not tunnel certain ports over SSH? Nobody will see what's going thru the ssh tunnel anyway.

  • @pucktoad
    @pucktoad Před 2 lety +1

    Have you considered a video on zeronet?

  • @electricz3045
    @electricz3045 Před 2 lety +6

    "i use arch btw" 🤣

  • @johannordstrom1932
    @johannordstrom1932 Před 2 lety

    GTFOGlowie is GOAT hostname

  • @electricman1884
    @electricman1884 Před 2 lety

    Is there any possibility to set up tor relay or i2p if i have router with mobile data without using vpn ?

  • @jonathanrealman8415
    @jonathanrealman8415 Před 2 lety

    I own a pfsense firewall, could I technically run the I2P router on that firewall?

  • @chubbycatfish4573
    @chubbycatfish4573 Před 2 lety +5

    Kenny is the new Lain.

    • @magnusanderson6681
      @magnusanderson6681 Před 2 lety +1

      I need to watch this anime don't I
      It's actually pretty sad I've seen dozens of anime but none of the classics

    • @chubbycatfish4573
      @chubbycatfish4573 Před 2 lety +1

      @@magnusanderson6681 You should!

  • @All3me1
    @All3me1 Před rokem

    I did change that rule in the config but it stills says firewalled
    Should I change something in the router settings?

  • @mushenji
    @mushenji Před 2 lety +14

    Next; talk about distributed web 3. I already set up my tor middle node on a VPS. Next is to set up I2P.

  • @noanyobiseniss7462
    @noanyobiseniss7462 Před 2 lety +1

    Bout time you got there.

  • @semioval
    @semioval Před 2 lety +15

    WHAT THE FUCK IS KERNEL AND HOW DO I UNINSTALL IT?!

    • @N.S.A.
      @N.S.A. Před 2 lety +4

      There is a system32 folder on your computer
      Just leave it where it is.

    • @smayansahu1070
      @smayansahu1070 Před 2 lety +3

      sudo pacman -R linux

  • @Flat_Erik
    @Flat_Erik Před 2 lety

    you should have shown us the chan-memorial i2p xD... im pretty sure that there's only youtube friendly content on it

  • @Ultrajamz
    @Ultrajamz Před 2 lety +3

    I feel like soon either via new law or new interpretation of the law, they will make this a crime

  • @donniedarko6432
    @donniedarko6432 Před rokem

    can i use i2p on tails? and if yes how can i install the programm on the persistent volume?

  • @stepannovotny4291
    @stepannovotny4291 Před rokem

    The Java client does pass HTTPS but the i2pd not so much! I hope they fix that.

  • @kay_Z420
    @kay_Z420 Před 10 měsíci

    Any good advice in creting a site eg. The html layout and where to go to get captchas set up

    • @sassycat77
      @sassycat77 Před 10 měsíci

      Info like that is on google

  • @isbestlizard
    @isbestlizard Před 2 lety

    I don't agree with your comment that you don't need to worry about https because i2p encrypts. Surely using http means that the site you're browsing, and any data you get/post to it, is sent in the clear over the internet and can be slurped up. Enforcing https means that only the destination web server can see that data, and hopefully (assuming they've not jumped into bed with the NSA) remains private.

  • @pushkalsingh5603
    @pushkalsingh5603 Před 2 lety

    I AM HAVING DIFFICULTIES CONFIGURING I2P WITH MY TOR BROWSER ANY DETAILED GUID TO HELP OUT WITH THIS????

  • @donnadie2068
    @donnadie2068 Před 2 lety

    What do you think about Zeronet?

  • @destroyer2973
    @destroyer2973 Před rokem

    You should check out freenet btw.

  • @lorenzo42p
    @lorenzo42p Před 2 lety

    if you need a port forward, then set up a proper port forward in your router. I would never enable upnp

  • @tedbybolf4616
    @tedbybolf4616 Před 2 lety +2

    Coreboot your thinkpad for more security.

  • @C1rnobyl
    @C1rnobyl Před 3 měsíci

    Most people can't run a good Tor relay or I2P router at home unless they have fiber to the premises Internet. Upload bandwidth is a big issue.

  • @AndrewWilson1991
    @AndrewWilson1991 Před 2 lety

    i can see the glow from here

  • @enochrockwell7202
    @enochrockwell7202 Před 2 lety

    For some reason i'm reminded of when zeronet was a thing

  • @Bhatakti_Hawas
    @Bhatakti_Hawas Před 2 lety +6

    Plot Twist : Mental Outlaw works in the CIA

  • @RusherDevelopment
    @RusherDevelopment Před 2 lety

    Epic

  • @nathanfitzpatrick3152
    @nathanfitzpatrick3152 Před 2 lety

    can you run i2p on an openwrt or tomato router?

  • @nightking1863
    @nightking1863 Před 2 lety

    Please make a video on how to host a website on tor

  • @generalralph6291
    @generalralph6291 Před 2 lety +1

    Of course Lain is the mascot of the dark web! It’s obligatory!

  • @Torterra_ghahhyhiHd
    @Torterra_ghahhyhiHd Před rokem

    when i use tor my internet gets too slow. it not like im dont want.

  • @greob
    @greob Před 2 lety +6

    The Java implementation of i2p has a builtin torrent client, and some other neat stuffs (graphs, email client, etc.)

  • @kojitakamura2522
    @kojitakamura2522 Před 2 lety +2

    lokinet and freenet wen?

  • @hammerheadcorvette4
    @hammerheadcorvette4 Před 2 lety

    What's the name of the famous Book Club on the onion ?

  • @astlari
    @astlari Před 2 lety

    thanks

  • @im1random263
    @im1random263 Před 2 lety

    Why exactly does it take that long? Does it have to download something large?

    • @c4llv07e
      @c4llv07e Před 2 lety

      It is searching random nodes for connection.

  • @battokizu
    @battokizu Před 2 lety

    i2p chads rise up

  • @PurchaseAreaMusic
    @PurchaseAreaMusic Před 2 lety

    TOR was created by United States Naval Research Laboratory employees and the NSA. JS

  • @nikro7239
    @nikro7239 Před rokem

    But isn't using vps for that dangerous? Because your vps provider might see what you do

  • @l_s2701
    @l_s2701 Před 2 lety +4

    Alright alright what's your iFunny

  • @alice20001
    @alice20001 Před 2 lety +1

    @9:07 Omg, did you just full screen a browser?