<div id="copyright">
Welcome to TiddlyWiki created by Jeremy Ruston, Copyright © 2007 UnaMesa Association
</div>
<noscript>
<div id="javascriptWarning">This page requires JavaScript to function properly.<br /><br />If you are using Microsoft Internet Explorer you may need to click on the yellow bar above and select 'Allow Blocked Content'. You must then click 'Yes' on the following security warning.</div>
</noscript>
Packaging: coud use help (GUIX?)https://en.wikipedia.org/wiki/Nix_package_manager
https://gnunet.org/svn/gnunet/doc/man/gnunet-gns-proxy.1You are welcome. However it needs some work. Freenet uses fproxy:
A freesite may embed or link to pictures or other content. In case this is not done through the .gnunet-Address, but the usual address (http://www.mysite.com/title.jpg, for example), the requester looses anonymity when requesting the content: the request does not get routed through GNUnet, but a normal - maybe not encrypted - direct connection to the destination server. To circumvent this, an additional proxy server has to be added in front of the SOCKS proxy. This proxy checks every "normal" request whether it is the result of a link on an anonymous page (through the HTTP header "Referrer"). In this case, a warning message is returned first.This is shit. Why does it not just block unsafe/non-anonymous requests by default? Now I have to write a fucking intermediate SOCKS proxy just to filter them out. Fuck.
FreeServices is not a concept of mine, but it is a concept that is still present on GNUnet's "todo" list, even if a description of it, unfortunately, isn't present on the new website anymore. So, for the sake of documentation, here is the text from [u][b]GNUnet's old website regarding FreeServices[/u][/b] (with only small changes):IOW, it was an idea like Freedom Hosting that excerpt is from, and it has not been implemented. I was just showing the part of how you can build a SOCKS proxy in GNUnet, which works like a charm. You can also set up your own SOCKS proxy that checks if the resources are ECRS links. You can use any mesh network if you like, which is why I included fproxy in the post.
Then give me your definition of anonymity. A public key certainly ruins your identity.I mean exactly the same thing as Tor's hidden services provide (ideally). The hidden service doesn't know anything about who is connecting, the client doesn't know anything about the hidden service except for its public key, and an outside observer must not be able to find out anything, not even that a connection/transfer occurred, much less identify its endpoints. The public key is needed to both identity and authenticate the connection's destination.
Those are the real psychopaths, the kind of people that will be and most likely already are doing harm in real life. Those fucks masturbate to dead animals.Masturbating to images isn't illegal; making it illegal would be creating a type of ``thoughtcrime''. That being said, browsing that website is the kind of probable cause needed to get a surveillance warrant, and if you're right about them doing harm in real life, then they'll get arrested for animal abuse (which is illegal).
not even that a connection/transfer occurred,that one is impossible, even on tor. You can see that traffic was hit on nodes, even bridges, although it is ambiguous what was transferred and who they are. But thanks for clarifying.
that one is impossible
that one is impossible, even on tor.Wrong. It's merely infeasible, at least the naive way.