Add new FAQ items from Reddit analysis

This commit is contained in:
idk
2020-11-24 14:23:23 -05:00
parent 8e849eac03
commit 8ca6ab992b
3 changed files with 45 additions and 745 deletions

View File

@@ -10,16 +10,22 @@
<li><a href="#eepsite">{% trans %}Whats an "eepsite" and how do I configure my browser so I can use them?{% endtrans %}</a></li>
<li><a href="#active">{% trans %}What do the Active x/y numbers mean in the router console?{% endtrans %}</a></li>
<li><a href="#exit">{% trans %}Is my router an "exit node"(outproxy) to the regular Internet? I don't want it to be.{% endtrans %}</a></li>
<li><a href="#safe">{% trans %}Is using I2P Safe?{% endtrans %}</a></li>
<li><a href="#netdb_ip">{% trans %}I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?{% endtrans %}</a></li>
<li><a href="#detection">{% trans %}Is it easy to detect the use of I2P by analyzing network traffic?{% endtrans %}</a></li>
<li><a href="#outproxy">{% trans %}I can't access regular Internet sites through I2P.{% endtrans %}</a></li>
<li><a href="#proxy_safe">{% trans %}Is using an outproxy safe?{% endtrans %}</a></li>
<li><a href="#badcontent">{% trans %}I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?{% endtrans %}</a></li>
<li><a href="#blocking">{% trans %}Is it possible to block I2P?{% endtrans %}</a></li>
<li style="list-style: none; display: inline">
<h4>{{ _('Getting Started') }}</h4>
</li>
<li><a href="#browserproxy">{% trans %}How do I configure my browser?{% endtrans %}</a></li>
<li><a href="#irc">{% trans %}How do I connect to IRC within I2P?{% endtrans %}</a></li>
<li><a href="#myeepsite">{% trans %}How do I set up my own eepsite?{% endtrans %}</a></li>
<li><a href="#hosting">{% trans %}If I host a website at I2P at home, containing only HTML and CSS, is it dangerous?{% endtrans %}</a></li>
<li><a href="#addresses">{% trans %}How Does I2P find ".i2p" websites?{% endtrans %}</a></li>
<li><a href="#addressbook">{% trans %}How do I add to the AddressBook?{% endtrans %}</a></li>
<li><a href="#ports">{% trans %}What ports does I2P use?{% endtrans %}</a></li>
<li><a href="#subscriptions">{% trans %}I'm missing lots of hosts in my addressbook. What are some good subscription links?{% endtrans %}</a></li>
<li><a href="#remote_webconsole">{% trans %}How can I access the web console from my other machines or password protect it?{% endtrans %}</a></li>
@@ -110,6 +116,15 @@ By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single
There is an <a href="{{ outproxy }}">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy.
{%- endtrans %}</p>
<h3 id="safe">{% trans %}Is using I2P Safe?{% endtrans %}</h3>
<p>{% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing
software and strong encryption are not illegal to possess or use.{% endtrans %}</p>
<p>{% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic.
{% endtrans %}</p>
<p>Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.</p>
<h3 id="netdb_ip"><span class="permalink"><a href="#netdb_ip">
{% trans %}I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?{% endtrans %}</a></span>
</h3>
@@ -121,6 +136,14 @@ Yes, and this is how a fully distributed peer-to-peer network works. Every node
While the fact that your computer runs I2P is public, nobody can see your activities in it. You can't say if a user behind this IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the project.
{%- endtrans %}</p>
<h3 id="detection">{% trans %}Is it easy to detect the use of I2P by analyzing network traffic?{% endtrans %}</h3>
<p>{% trans %}It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.
The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a
bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able
to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic
on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out
to reseed servers to get more peers, which a network administrator can probably observe.{% endtrans %}</p>
<h3 id="outproxy"><span class="permalink"><a href="#outproxy">
{% trans %}I can't access regular Internet sites through I2P.{% endtrans %}</a></span>
</h3>
@@ -198,6 +221,12 @@ Your router will not request any content without your specific instruction to do
</li>
</ul>
<h3 id="blocking">Is it possible to block I2P?</h3>
<p>{% trans %}Yes, by far the easiest and most common way is by blocking bootstrap, or "Reseed" servers. Completely blocking all obfuscated traffic
would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).
In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.
You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline.{% endtrans %}</p>
<h2>Getting Started</h2>
<h3 id="browserproxy"><span class="permalink"><a href="#browserproxy">
@@ -230,6 +259,22 @@ Weechat users can use the following command to add a new network:
Click on the <a href="http://localhost:7658/">Website</a> link at the top of your router console for instructions.
{%- endtrans %}</p>
<h3 id="hosting">{% trans %}If I host a website at I2P at home, containing only HTML and CSS, is it dangerous?{% endtrans %}</h3>
<p>{% trans %}If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.
If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then
your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to
real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or
Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting
yourself from a real threat will take real consideration in any case.{% endtrans %}</p>
<h3 id="addresses">{% trans %}How Does I2P find ".i2p" websites? {% endtrans %}</h3>
<p>The I2P Addressbook application maps human-readable names to long-term destinations, associated with services, making it more like a hosts file or a contact list than a network database or a DNS service. It's also local-first there is no recognized global namespace, you decide what any given .i2p domain maps to in the end. The middle-ground is something called a "Jump Service" which provides a human-readable name by redirecting you to a page where you will be asked "Do you give the I2P router permission to call $SITE_CRYPTO_KEY the name $SITE_NAME.i2p" or something to that effect. Once it's in your addressbook, you can generate your own jump URL's to help share the site with others. </p>
<h3 id="addressbook">{% trans %}How do I add addresses to the Addressbook? {% endtrans %}</h3>
<p>{% trans %}You cannot add an address without knowing at least the base32 or base64 of the site you want to visit. The "hostname" which is human-readable is only an alias for the cryptographic address, which corresponds to the base32 or base64. Without the cryptographic address, there is no way to access an I2P site, this is by design. Distributing the address to people who do not know it yet is usually the responsibility of the Jump service provider. Visiting an I2P site which is unknown will trigger the use of a Jump service. stats.i2p is the most reliable Jump service.{% endtrans %}</p>
<p>{% trans %}If you're hosting a site via i2ptunnel, then it won't have a registration with a jump service yet. To give it a URL locally, then visit the configuration page and click the button that says "Add to Local Addressbook." Then go to http://127.0.0.1:7657/dns to look up the addresshelper URL and share it.{% endtrans %}</p>
<h3 id="ports"><span class="permalink"><a href="#ports">
{% trans %}What ports does I2P use?{% endtrans %}</a></span>
</h3>