• 3 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: May 9th, 2024

help-circle

  • Nope, any browser should work. The compose file in my repo should be exposing qbittorrent on port 8080 (line 27 in the file). I would say first:

    1. make sure the containers are running, use podman-compose ps or docker-compose ps from the folder that contains the compose file
    2. use ping to make sure you can reach the server
    3. use ss or netstat on your server to make sure it’s actually listening on the port you expect qBittorrent to be listening on (8080 unless you changed it)
    4. view logs using podman-compose logs from the folder that contains the compose file
    5. if you can see the web ui but don’t know what the password is, use podman-compose logs and you should see the temporary password generated by qBittorrent (this is explained in the guide)





  • Thanks for the info, I would not claim to be an expert about I2P so some of this is definitely new to me. Though I think the situation has improved quite a bit.

    Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.

    If you just want I2P without the torrenting, you can use the official I2P router, which is just an HTTP proxy that runs on your PC, just like Tor. The 3rd-party router used in my guide, i2pd, has a Flatpak as well. So as far as installing the router goes, it’s a few clicks. You are correct that it does require configuring the browser though, you are correct. This is explained in my guide and also on the official website. Not as easy as clicking an “Install” button, but only takes around 5 minutes. I wish there were an official I2P browser like the Tor browser though.

    Must-have logging: The I2P user interface must be logged in for users to access their material.

    Not sure what you mean by this. I’ve never had to log into anything to set up I2P.

    Severe vulnerabilities

    I have no doubt. But Tor has had many vulnerabilities too. Both have gotten much better over time.

    A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.

    Definitely true. In fact it makes me suspicious how fast TOR is despite how many users there are, and how the relatively high requirements to be a relay (not to mention an exit node). AFAIK TOR is heavily reliant on rich and generous patrons, which makes me wonder about the motives of these patrons. I believe I2P has the potential to be much more decentralized, since every user is expected to also be a router, and Techlore has also raised this point (though I don’t have the video on me right now).

    Less anonymity when browsing indexed sites: I2P does not ensure that users’ browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.

    I didn’t know this. What are indexed sites?












  • why is a split tunnel relevant? I thought all VPNs are vulnerable unless they use a firewall like I do, or network namespaces.

    At least the way I understand it, a normal VPN redirects your internet traffic to instead go through a virtual network interface, which then encrypts and sends your traffic through the VPN. This attack uses a malicious DHCP server to inject routes into your system, redirecting traffic to the attacker instead of towards the virtual network interface.





  • Actually my firewall is persistent, just like many of the other good VPN clients, so “kill switch” is a bit of a misnomer. Which is why I called it wg-lockdown, named after Mullvad’s lockdown mode. Persistent firewalls are effective, they just add a very tiny side-channel, as discussed in the link in my post. I just used the terms “kill switch” in my post because that’s what many other people use.

    Though the point about the LAN is a good point, I didn’t consider that. I added LAN access because without it, the firewall was interfering with the networking of my docker container and virtual machines, which use local subnets. Even the official Mullvad client has issues with this. What do you recommend in this case? Manually whitelist the local subnets used by docker and my other virtual networks?

    Edit: actually upon reading Mullvad’s statement on TunnelVision, I realized that my firewall is still effective because it only allows traffic directed to LAN IP’s to bypass the VPN. So regular internet traffic will be blocked if the attacker tries to redirect it to the LAN. I’m glad I used Mullvad as a reference implementation 😅