Improve eepSite version

This commit is contained in:
idk
2020-01-28 11:26:12 -05:00
parent 1fb72f713a
commit 0fafba00a0
6 changed files with 74 additions and 71 deletions

View File

@ -15,4 +15,5 @@ index: README
sed "s|magnetsub|[Magnet Link]($(MAGNET))|g" README.md | \
sed 's|https://github.com/eyedeekay/various-i2p-browsers/tree/master||g' | markdown | tee -a index.html
@echo "</body>" >> index.html
@echo "</html>" >> index.html
@echo "</html>" >> index.html

View File

@ -13,15 +13,15 @@ are also I2P labs projects.
### I2P Webextensions and Browser Research
* [I2P in Private Browsing Mode for Firefox](https://eyedeekay.github.io/I2P-in-Private-Browsing-Mode-Firefox/)
* [I2P in Private Browsing Mode for Firefox](I2P-in-Private-Browsing-Mode-Firefox/)
inspired by Brave, this browser extension enforces a few privacy rules for
Firefox, then implements a set of "Container Tabs" which can be used to browse
I2P in a way which is automatic and safe.
* [I2P Configuration Helper for Chromium](https://eyedeekay.github.io/I2P-Configuration-For-Chromium/)
* [I2P Configuration Helper for Chromium](I2P-Configuration-For-Chromium/)
A fork of the Firefox plugin before it used container tabs, after the user sets
up an I2P browsing profile this plugin can automatically set up the profile to
use I2P with the maximum privacy available from Chromium.
* [I2P Browser Fingerprint Gallery](https://eyedeekay.github.io/I2P-Browser-Attackability-Evaluation/)
* [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/)
This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them.

26
eeploy.sh Executable file
View File

@ -0,0 +1,26 @@
#! /usr/bin/env bash
DOCROOT=/var/lib/i2p/i2p-config/eepsite/docroot/
DOCREPO=https://github.com/eyedeekay/eyedeekay.github.io
FFXDOCROOT=/var/lib/i2p/i2p-config/eepsite/docroot/I2P-in-Private-Browsing-Mode-Firefox
FFXDOCREPO=https://github.com/eyedeekay/I2P-in-Private-Browsing-Mode-Firefox
CHRDOCROOT=/var/lib/i2p/i2p-config/eepsite/docroot/I2P-Configuration-For-Chromium
CHRDOCREPO=https://github.com/eyedeekay/I2P-Configuration-For-Chromium
FNGDOCROOT=/var/lib/i2p/i2p-config/eepsite/docroot/I2P-Browser-Attackability-Evaluation
FNGDOCREPO=https://github.com/eyedeekay/I2P-Browser-Attackability-Evaluation
function setuppage(){
DOCROOT=$1
DOCREPO=$2
echo "Setting personal site from $DOCREPO in $DOCROOT"
if [ -d "$DOCROOT" ]; then
if [ -d "$DOCROOT.git" ]; then
cd "$DOCROOT" && git pull
else
git clone "$DOCREPO" "$DOCROOT"
fi
fi
}
setuppage $DOCROOT $DOCREPO

View File

@ -19,15 +19,15 @@ are also I2P labs projects.</p>
<h3>I2P Webextensions and Browser Research</h3>
<ul>
<li><a href="https://eyedeekay.github.io/I2P-in-Private-Browsing-Mode-Firefox/">I2P in Private Browsing Mode for Firefox</a>
<li><a href="I2P-in-Private-Browsing-Mode-Firefox/">I2P in Private Browsing Mode for Firefox</a>
inspired by Brave, this browser extension enforces a few privacy rules for
Firefox, then implements a set of "Container Tabs" which can be used to browse
I2P in a way which is automatic and safe.</li>
<li><a href="https://eyedeekay.github.io/I2P-Configuration-For-Chromium/">I2P Configuration Helper for Chromium</a>
<li><a href="I2P-Configuration-For-Chromium/">I2P Configuration Helper for Chromium</a>
A fork of the Firefox plugin before it used container tabs, after the user sets
up an I2P browsing profile this plugin can automatically set up the profile to
use I2P with the maximum privacy available from Chromium.</li>
<li><a href="https://eyedeekay.github.io/I2P-Browser-Attackability-Evaluation/">I2P Browser Fingerprint Gallery</a>
<li><a href="I2P-Browser-Attackability-Evaluation/">I2P Browser Fingerprint Gallery</a>
This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them.</li>
</ul>

View File

@ -1,43 +1,3 @@
body {
font-size: 62.5%;
font-family: sans-serif;
background: #808080;
}
.clear { clear: both; }
#header {
background: #333333;
color: #00FF99;
}
img {
display: block;
max-width: 65%;
margin: auto;
}
a {
color: #9370DB;
}
#content {
max-width: 58%;
background: #2F4F4F;
float: right;
color: #00FF99;
}
#sidebar {
width: 40%;
max-width: 40%;
float: left;
vertical-align: top;
background: #2F4F4F;
color: #00FF99;
word-wrap: break-word;
}
* {
padding: 0;
margin: 0
@ -119,8 +79,11 @@ p {
background: #f8f8ff;
min-width: 95%
}
#header,
.application-info,
.extended-info {
.browser-info,
.extended-info,
.search-info {
min-height: 3rem;
padding: 1rem;
margin-top: 1.5rem;
@ -140,7 +103,6 @@ h1 {
color: #41465f;
border: 1px solid #dee2e6;
border-radius: 2px 2px 0 0;
width: 90%;
padding-left: 5%
}
h2,
@ -151,7 +113,6 @@ h3 {
font-size: 25px;
text-transform: uppercase;
color: #41465f;
border: 1px solid #dee2e6;
border-radius: 2px 2px 0 0;
width: 90%;
padding-left: 5%
@ -207,21 +168,23 @@ li {
margin: .5rem .5rem .5rem 32%
}
#readyness {
min-height: 5rem;
padding: .5rem;
margin: .5rem;
padding-top: 1rem;
padding-bottom: 1rem;
margin: 1rem;
width: 42%;
min-width: 42%;
background: #dee2e6;
text-align: center!important;
border: 1px solid #dee2e6;
border-radius: 2px;
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc;
display: inline-block
}
#onboarding {
min-height: 5rem;
padding: .5rem;
margin: .5rem;
margin-top: 4rem;
width: 42%;
min-width: 42%;
font-size: 2rem;
@ -232,19 +195,16 @@ li {
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc
}
#i2pbrowser-description {
padding-top: 1rem;
padding-bottom: 1rem;
width: 50%;
min-width: 50%;
min-height: 5rem;
padding: .5rem;
display: inline;
display: inline-block;
background: #dee2e6;
float: right;
border: 1px solid #dee2e6;
border-radius: 2px;
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc
}
#applicationExplain,
#controlExplain,
#linksExplain {
min-height: 5rem;
padding: .5rem;
@ -252,19 +212,32 @@ li {
width: 30%;
min-width: 30%;
background: #dee2e6;
float: left;
text-align: center!important;
border: 1px solid #dee2e6;
border-radius: 2px;
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc
}
#applicationExplain,
#controlExplain {
min-height: 5rem;
padding: .5rem;
margin: .5rem;
width: 30%;
min-width: 30%;
background: #dee2e6;
text-align: center!important;
border: 1px solid #dee2e6;
border-radius: 2px;
box-shadow: inset 0 0 0 1px #fff,0 0 1px #ccc;
float: left
}
#proxyReady {
min-height: 3rem;
padding: .5rem;
margin: .2rem;
width: 38%;
min-width: 38%;
display: inline;
display: inline-block;
background: #d9d9d6;
float: right;
text-align: center!important;
@ -278,7 +251,7 @@ li {
margin: .2rem;
width: 38%;
min-width: 38%;
display: inline;
display: inline-block;
float: right;
text-align: center!important;
border: 1px solid #ffc56d;
@ -292,7 +265,7 @@ li {
margin: .2rem;
width: 38%;
min-width: 38%;
display: inline;
display: inline-block;
float: left;
text-align: center!important;
border: 1px solid #f7e59a;
@ -305,9 +278,6 @@ li {
text-align: left;
display: none
}
#proxy-check {
visibility: hidden
}
#info-content {
display: none
}
@ -328,4 +298,10 @@ img.readyness {
display: none
}
}
li {
width: 90%;
margin-left: 0
}
#applicationExplain {
float: unset
}

View File

@ -7,15 +7,15 @@ are also I2P labs projects.
### I2P Webextensions and Browser Research
* [I2P in Private Browsing Mode for Firefox](https://eyedeekay.github.io/I2P-in-Private-Browsing-Mode-Firefox/)
* [I2P in Private Browsing Mode for Firefox](I2P-in-Private-Browsing-Mode-Firefox/)
inspired by Brave, this browser extension enforces a few privacy rules for
Firefox, then implements a set of "Container Tabs" which can be used to browse
I2P in a way which is automatic and safe.
* [I2P Configuration Helper for Chromium](https://eyedeekay.github.io/I2P-Configuration-For-Chromium/)
* [I2P Configuration Helper for Chromium](I2P-Configuration-For-Chromium/)
A fork of the Firefox plugin before it used container tabs, after the user sets
up an I2P browsing profile this plugin can automatically set up the profile to
use I2P with the maximum privacy available from Chromium.
* [I2P Browser Fingerprint Gallery](https://eyedeekay.github.io/I2P-Browser-Attackability-Evaluation/)
* [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/)
This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them.