-- Leo's gemini proxy

-- Connecting to nicksphere.ch:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-US

 _  _ _    _        _              _     _
| \| (_)__| |_  ___| |__ _ ___  _ | |___| |_  _ _  ___ ___ _ _
| .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \
|_|\_|_\__|_||_\___/_\__,_/__/  \__/\___/_||_|_||_/__/\___/_||_|


🔗 Return to homepage


📆 February 21, 2023 | ⏱️ 1 minute read | 🏷️ computing



I2P and Tor Need Your Support


Since June 9th of 2022, the Tor network has been undergoing a DDoS attack¹. Since a couple weeks ago, I2P has also been undergoing a DDoS attack². It's impossible to say for certain who's attacking Tor, but it's likely a nation-state. I don't think it's known who is attacking I2P or if the attacks are related.


Many people rely on these networks for their personal privacy and safety. Until GNUnet³ or something like it provides a full solution to the weaknesses of the existing network stack, Tor and I2P are the best alternatives. In order to make the attacks more expensive, please join me and run an I2P node⁴ or Tor relay⁵ if you can.


They're both extremely easy to set up. I've run multiple Tor relays in the past for months at a time. I currently have 3 separate I2P nodes online and I'm working on provisioning a fast new Tor relay. All you have to do is install the software, change a few lines in the configuration file, restart the daemon, and you're good to go. And if you enable automatic updates, the nodes practically maintain themselves.


So why not give it a try?



References


🔗 [1]: the Tor network has been undergoing a DDoS attack

🔗 [2]: I2P has also been undergoing a DDoS attack

🔗 [3]: GNUnet

🔗 [4]: I2P node

🔗 [5]: Tor relay



Copyright 2020-2024 Nicholas Johnson. CC BY-SA 4.0.

-- Response ended

-- Page fetched on Sat May 11 20:59:07 2024