Download Appteka (works without ads)

Appteka is a community-driven, free Android apps market

I2P

I2P

9 downloads

Uploaded by
Silent Miqo
Version
2.7.1 (build 4745289) 
Size
6.3 MiB
Publish Date
2025-02-05
Category
Web
Package
net.i2p.android.router
Minimum OS
Android 5.0
SHA1
592b9bd990dcc6bb7f056c2e72e29ca3eef608f3
Description
Теперь можно выходить с андроида в i2p. Есть встроеный браузер который заточен под i2p хотя можно и использовать Firefox mobile если вписать локалку 4444 (подробности можно узнать в помощи программы). I2P – это анонимная компьютерная сеть. Сеть I2P является оверлейной, устойчивой, анонимной и децентрализованной. При передаче данных между узлами сети применяется шифрование. Внутри сети I2P можно разместить любой сервис с сохранением анонимности сервера. В сети I2P работают http-серверы; адреса сайтов находятся в псевдодоменном пространстве «.i2p». Поверх сети I2P можно строить одноранговые сети, например, BitTorrent, eDonkey, Kad, Gnutella и т. д. I2P – это анонимная коммуникационная система в публичном Интернете (он же Clearnet). Это одноранговая коммуникационная сеть, которая использует преимущества инфраструктуры Интернета, но использует сквозное шифрование и другие методы для обеспечения анонимности своих пользователей, анонимизирующая сеть, предлагающая простой уровень, который приложения, чувствительные к идентификации, могут использовать для безопасного взаимодействия. Все данные защищены несколькими уровнями шифрования, а сеть является распределенной и динамичной, без доверенных сторон. ◇ Список хостов, которые рекомендуется добавить в адресную книгу ◇ ЗЫ: обновлённый список хостов, так как большая часть из предыдущего списка перестала работать, я решил их убрать + добавить новые хосты. http://notbob.i2p/hosts.txt http://notbob.i2p/hosts-all.txt http://reg.i2p/hosts.txt http://isitup.i2p/alive-hosts.txt http://i2p-projekt.i2p/hosts.txt http://identiguy.i2p/hosts.txt http://skank.i2p/hosts.txt http://stats.i2p/cgi-bin/newhosts.txt http://idk.i2p/hosts.txt http://freehosts.i2p/hosts.txt http://diva.i2p/hosts.txt http://joajgazyztfssty4w2on5oaqksz6tqoxbduy553y34mf4byv6gpq.b32.i2p/export/alive-hosts.txt http://u74oixqy3nxcdap4krfphch6lflea27vqns3k6wjdlqar6jq7sda.b32.i2p/hosts.txt Список внешних прокси: exit.stormycloud.i2p purokishi.i2p false.i2p outproxy-tor.meeh.i2p outproxy.acetone.i2p outproxy.bandura.i2p 4uhjrmilirueyiaps7qshnyhbamyxusyjcbiy6lwh7oq5wyqisbq.b32.i2p:8888 ♤ Инструкция по быстрой настройке в связке с Habit browser ♤ Качаем роутер(apk i2p) и Habit browser. Устанавливаем. Запускаем хабит браузер и входим в настройки и у нас сразу открыта вкладка основные, там ищем прокси-сервер. В прокси-сервер ставим галочку для активации настройки и далее в хост вводим localhost и в порт 4444. Выходим из настроек и закрываем браузер. Далее открываем i2p клиент и нажимаем start router и ждем когда в строке состояния вашего устройства человечек встанет ровна и высветится надпись clients ready или как-то так. Все теперь через хабит браузер пробуем открыть zzz.i2p если открылось, то все отлично у вас все правильно настроено. Для того, чтобы использовать i2p надо сначала всегда запустить клиент, нажать start router и дождаться когда человечек встанет ровно. Связка orbot(tor) + i2p используя privoxy Инструкция по связке i2p и Orbot в одном браузере используя privoxy. Нужен рут. Надо в /data/data/org.torproject.android/app_bin/ в файле privoxy.config (если не открывается поставьте права 777) добавить после forward-socks4a / 127.0.0.1:9050 . Вот это: forward-socks5 / 127.0.0.1:9050 . forward .i2p localhost:4444 Внимание после 4444 точки не должно быть. Теперь в браузере например в Habit Browser в настройках прокси(в данном случае надо зайти во вкладку основные и затем во вкладку прокси) прописать адрес 127.0.0.1, а порт 8118. Теперь запускаем orbot(подключение) он же запустит и privoxy(да да без orbot privoxy не запустится. Можно конечно и через терминал попытаться запустить, но тогда подключить orbot будет не возможно) и затем запускаем клиент i2p. Теперь при заходе на сайты .i2p трафик будет идти через клиент i2p во всех остальных случаях трафик будет идти через orbot. Обзор I2P: https://telegra.ph/i2p-01-01 I2P Search: https://i2psearch.com FAQ: https://geti2p.net/ru/faq Форум I2P: http://zzz.i2p inproxy для просмотра сайтов, размещенных в сети I2P: https://i2phides.me http://ml5oqtnuk5fj5sohpssh44rpqontkdxtkvwqkwsbcjri6xnxxvzrxoad.onion https://i2p-inproxy.mk16.de Список известных .i2p сайтов: https://letsdecentralize.org/rollcall/i2p.html Ramble: https://ramble.pw/f/I2P Официальный аккаунт разработчика I2P в GitHub: https://github.com/i2p Официальный аккаунт разработчика I2P в Reddit: https://farside.link/redlib/r/i2p Официальный аккаунт разработчика I2p в Twitter: https://farside.link/nitter/i2p Официальный аккаунт разработчика I2p в Mastodon: https://mastodon.social/@i2p Открытый исходный код I2P: https://github.com/i2p/i2p.i2p Если хотите высказать все ошибки/недочёты, которые выявлены в мобильном клиенте I2P, то об этом можно спросить здесь. Также, может являться, как весь список ошибок в I2P: https://trac.i2p2.de, https://i2pgit.org/i2p-hackers/i2p.i2p/-/issues, http://7qeve4v2chmjdqlwpa3vl7aojf3nodbku7vepnjwrsxljzqipz6a.b32.i2p, http://47ggr2fa3vnwfyhvgskzdmr3i32eijwymxohtxsls45dulmriwxszjad.onion, http://git.idk.i2p/i2p-hackers/i2p.i2p/-/issues Список всех изменений: https://geti2p.net/blog Официальный сайт: https://geti2p.net F-Droid: https://f-droid.org/app/net.i2p.android.router Now you can go from android to i2p. There is a built-in browser which is geared towards i2p although you can also use Firefox mobile if you enter local 4444 (see the program's help for details). I2P is an anonymous computer network. The I2P network is overlay, resilient, anonymous and decentralized. Encryption is used to transfer data between the network nodes. Within the I2P network any service can be hosted and the server remains anonymous. The I2P network consists of http servers; the addresses of the sites are in the ".i2p" pseudo-domain space. Peer-to-peer networks such as BitTorrent, eDonkey, Kad, Gnutella, etc. can be built on top of the I2P network. I2P is an anonymous communication system on the public Internet (aka Clearnet). It is a peer-to-peer communication network that takes advantage of the infrastructure of the Internet, but uses end-to-end encryption and other methods to provide anonymity to its users, an anonymizing network that offers a simple layer that identity-sensitive applications can use to communicate securely. All data is protected by multiple layers of encryption, and the network is distributed and dynamic, with no trusted parties. ◇ List of hosts that are recommended to be added to the address book ◇ PS: updated list of hosts, since most of the previous list hosts not working, I decided to remove them + add new hosts. http://notbob.i2p/hosts.txt http://notbob.i2p/hosts-all.txt http://reg.i2p/hosts.txt http://isitup.i2p/alive-hosts.txt http://i2p-projekt.i2p/hosts.txt http://identiguy.i2p/hosts.txt http://skank.i2p/hosts.txt http://stats.i2p/cgi-bin/newhosts.txt http://idk.i2p/hosts.txt http://freehosts.i2p/hosts.txt http://diva.i2p/hosts.txt http://joajgazyztfssty4w2on5oaqksz6tqoxbduy553y34mf4byv6gpq.b32.i2p/export/alive-hosts.txt http://u74oixqy3nxcdap4krfphch6lflea27vqns3k6wjdlqar6jq7sda.b32.i2p/hosts.txt What is a outproxy? A outproxy would be the same as a Tor exit node for http(s). It’s a way to allow your tunnel clients to exit via your router to the “clearnet”. Background History As you might not know, I2P was designed to be an internal network, which where outproxies weren’t used since all traffic where expected to remain inside the I2P network. Compared to Tor, I2P focused on internal hidden services rather than exits. For a long time it only existed 1-2 outproxies which comes with the default I2P config on new installations. It’s first now in recent time that I2P has gotten more focus on outproxies and their service. The two recent outproxies (or one, they both exit to the same backend service) is false.i2p and outproxy-tor.meeh.i2p which has been ran since ~2012-2013ish. For potential outproxy providers How much traffic can I expect? How much can you handle? :) It’s rate limit configuration in the hidden service manager where you can limit the amount of requests from clients on your outproxy tunnel, the section is named “Server Throttling”. Use that to limit the traffic to a outproxy. TL;DR - Howto setup an outproxy Create a server tunnel on your I2P outproxy router Setup privoxy/squid or another http proxy software of your choise Point the server tunnel to your http proxy port Increase the tunnel count, in my setup I have 16 and 3 backup tunnels The i2ptunnel.config should then look something similar to this; tunnel.10.description=false.i2p outproxy tunnel.10.name=false.i2p tunnel.10.option.enableUniqueLocal=true tunnel.10.option.i2cp.destination.sigType=EdDSA_SHA512_Ed25519 tunnel.10.option.i2cp.enableAccessList=false tunnel.10.option.i2cp.enableBlackList=false tunnel.10.option.i2cp.encryptLeaseSet=false tunnel.10.option.i2cp.reduceIdleTime=1200000 tunnel.10.option.i2cp.reduceOnIdle=false tunnel.10.option.i2cp.reduceQuantity=1 tunnel.10.option.i2p.streaming.connectDelay=0 tunnel.10.option.i2p.streaming.limitsManuallySet=true tunnel.10.option.i2p.streaming.maxConcurrentStreams=0 tunnel.10.option.i2p.streaming.maxConnsPerDay=0 tunnel.10.option.i2p.streaming.maxConnsPerHour=0 tunnel.10.option.i2p.streaming.maxConnsPerMinute=128 tunnel.10.option.i2p.streaming.maxTotalConnsPerDay=0 tunnel.10.option.i2p.streaming.maxTotalConnsPerHour=0 tunnel.10.option.i2p.streaming.maxTotalConnsPerMinute=0 tunnel.10.option.inbound.backupQuantity=3 tunnel.10.option.inbound.length=1 tunnel.10.option.inbound.lengthVariance=0 tunnel.10.option.inbound.nickname=false.i2p tunnel.10.option.inbound.quantity=16 tunnel.10.option.outbound.backupQuantity=3 tunnel.10.option.outbound.length=1 tunnel.10.option.outbound.lengthVariance=0 tunnel.10.option.outbound.nickname=false.i2p tunnel.10.option.outbound.quantity=16 tunnel.10.option.rejectInproxy=false tunnel.10.option.rejectReferer=false tunnel.10.option.rejectUserAgents=false tunnel.10.option.shouldBundleReplyInfo=true tunnel.10.option.useSSL=false tunnel.10.privKeyFile=i2ptunnel-false.i2p.priv.dat tunnel.10.startOnLoad=true tunnel.10.targetHost=127.0.0.1 tunnel.10.targetPort=3128 tunnel.10.type=server or 1. do run I2P 2. go to http://127.0.0.1:7657/i2ptunnelmgr 3. choose the I2P HTTP PROXY tunnel setup 4. In the field Outproxies do enter a new outproxy name, B32, seperated with comma 5. same for the SSL Outproxies field 6. save tunnel config 7. go to (I2P HTTPS PROXY) 8. add/replace the address in the Outproxies field 9. save config 10. If you do use I2P PetNames like false.i2p - you need to have the resolution in your local addressbook first. Do open the addressbook on http://127.0.0.1:7657/dns and add the PetName and b64 address to the master/private/published addressbook. 10.a. if the Outproxy registered itself on stats.i2p or inr.i2p addressbook service, you may get that entry via subscription 10.b. or enter the petname of the Outproxy in Browser with i2p proxy setup and you may use a helper link to enter the Outproxy into your addressbook. done. Router tweaking If you want to run a high-traffic outproxy you should also tweak your router.config. You can either edit the file on disk while the router is stopped, or via the advanced config page in the webconsole. i2np.ntcp.maxConnections=4096 i2np.udp.maxConnections=4096 router.maxParticipatingTunnels=512 Note that the maxParticipatingTunnels is set to a lower number for a reason, and it’s simple - if you want to have high-traffic on your outproxy - let the router focus on the service rather than forwarding other router traffic which isn’t relevant for your outproxy service. Outproxy service announcementPermalink Currently it’s no automatic way for I2P routers to discover new outproxies, so after you have setup your I2P outproxy service you would need to announce the service, for example at the I2P forum, the IRC network, Reddit, etc. How do I setup my router to use a outproxy?Permalink Outproxies can be configured under your HTTP Proxy tunnel in the Hidden Service Manager webui. Look at the image bellow. - Note that instead of only listing one outproxy like mine setup, you can have a comma separated list to use multiple outproxies for your router. ! What is the danger when using outproxies? There is a risk that the outproxy operator is malicious and records the requests or answers, i.e. logs them, or manipulates the answers. He can also censor pages, which is not that bad. There is roughly the same risk as when using the Tor network. The only difference is that the Tor network has more exit nodes than I2P outproxies. It is therefore recommended that you use Tor to surf the Clearnet. List of outproxies: exit.stormycloud.i2p purokishi.i2p false.i2p outproxy-tor.meeh.i2p outproxy.acetone.i2p outproxy.bandura.i2p 4uhjrmilirueyiaps7qshnyhbamyxusyjcbiy6lwh7oq5wyqisbq.b32.i2p:8888 ♤ Instructions for quick setup in conjunction with Habit browser ♤ Download the router (apk i2p) and Habit browser. Install it. Start the Habit browser and enter the settings and we immediately open the main tab, there you look for a proxy server. In the proxy checkbox to activate the setting and then enter localhost in the host and port 4444. Exit from the settings and close the browser. Next, open the i2p client and press start router and wait when the status bar on your device manovel stands up straight and the inscription clients ready or something like that. All now through the Habit browser trying to open zzz.i2p if it opened, then everything is fine, you are all set up correctly. In order to use i2p you always start the client first, press start router and wait till the man is level. Bundle orbot(tor) + i2p using privoxy Instructions for bundling i2p and Orbot in one browser using privoxy. Require root. It is necessary in /data/data/org.torproject.android/app_bin/ file privoxy.config (if it does not open, set the rights to 777) add after forward-socks4a / 127.0.0.1:9050. This: forward-socks5 / 127.0.0.1:9050 . forward .i2p localhost:4444 There must not be a dot after the 4444. Now in a browser, for example in the Habit Browser in the proxy settings (in this case you have to go to the main tab and then to the tab proxy) prescribe the address 127.0.0.1, and port 8118. Now run orbot (connection) it will also run privoxy (yes yes without orbot privoxy will not run. You can of course try to start privoxy via terminal, but then it will be impossible to connect orbot) and then start i2p client. Now when you visit . i2p sites traffic will go via i2p client in all other cases traffic will go via orbot. FAQ: https://geti2p.net/en/faq Forum I2P: http://zzz.i2p inproxy services for browsing websites hosted on the I2P network: https://i2phides.me http://ml5oqtnuk5fj5sohpssh44rpqontkdxtkvwqkwsbcjri6xnxxvzrxoad.onion https://i2p-inproxy.mk16.de List of known I2P sites: https://letsdecentralize.org/rollcall/i2p.html Official I2P developer account on GitHub: https://github.com/i2p Official I2P developer account on Reddit: https://fastsi.de/redlib/r/i2p Official I2P developer account on Twitter: https://fastsi.de/nitter/i2p Official I2P developer account on Mastodon: https://mastodon.social/@i2p Open source: https://github.com/i2p/i2p.i2p If you want to express all bugs/defects found in the I2P mobile client, you can ask about it here. Also, the whole list of bugs in I2P can be: https://trac.i2p2.de, https://i2pgit.org/i2p-hackers/i2p.i2p/-/issues, http://7qeve4v2chmjdqlwpa3vl7aojf3nodbku7vepnjwrsxljzqipz6a.b32.i2p, http://47ggr2fa3vnwfyhvgskzdmr3i32eijwymxohtxsls45dulmriwxszjad.onion, http://git.idk.i2p/i2p-hackers/i2p.i2p/-/issues List of all changes: https://geti2p.net/blog Official site: https://geti2p.net F-Droid: https://f-droid.org/app/net.i2p.android.router SAM docs: https://geti2p.net/en/docs/api/samv3 Logging main chats of I2P community for history and other channels just for fun: https://major.bazari.sh Ramble: https://ramble.pw/f/I2P Landchad: https://landchad.net/i2p I2P Search: https://i2psearch.com

You may also be interested