Use retroshare to buy things6/29/2023 ![]() I couldn’t test this too much due to the lack of nodes inside and outside of this networks but, with a small network of two nodes, my normal client wasn’t able to ready the hidden one and vice versa. ![]() I should explain that if we run a node this way the normal nodes will be only able to reach our node if they have configured an exit towards this networks. In version 0.6 Retroshare includes the possibility to run hidden nodes with integration for TOR and I2P, thanks to this instead of using our IP we can use onion or i2p addresses. This was the major reason why I stopped using Retroshare, even being based in a trust model I wasn’t convinced with the idea of my IP being disclosed like that. The major problem with this method is that our public IP is included in that key as Retroshare needs it to know where is our node and how to reach it. Doesn’t matter if you add somebody, if the other person doesn’t add you the connection will not happen. To be able to connect two nodes a key exchange must be done, like in GPG, with this both users allow the nodes to connect to each other. What makes Retroshare so interesting is its decentralized model where there are no servers to connect to obtain the different services, in this case, this services work in a secure way between different nodes connected between them. I2P provides the first layer of anonymity helping us hide our IP and Retroshare gives us several decentralized services. ![]() ![]() At the contrary, we are gonna have services that we already use daily but they are probably gonna me slower and have more downtime. The purpose of this post is, precisely, try to help them be more known.īut, What are the advantages of messing with this?Īt functional level? None. Neither of them is as well-known as Tor or other alternatives that we have seen even in the TV, sadly this means that the amount of help in the internet is quite limited. Today I bring you a post that combines two softwares that I have liked for a long time but that I didn’t have a lot of chances to really use them without being simple tests. It’s been a long time since I published something and it’s because I have been busy changing the blog to another server and testing several things like OSSEC that I will tell you about in future post. ![]() makes it difficult to intrude and hardly possible to monitor from an external point of view." This makes government monitoring and prosecution impossible beyond the will of Retroshare users.WARNING: This post is based in my personal opinion, I’m not trying to sell anything, and I’m not related to neither of the projects in any way. As described by Wikipedia, Retroshare ". Retroshare's decentralised model means there is no central authority to remove content. Experience has repeatedly shown that, even in the most repressive environments, this "friends-to-friends" delivery network is remarkably effective in disseminating information, with relatively little risks for the participating parties if one chooses his friends carefully, the chance of being caught doing the forbidden exchanges becomes very small. Because of the potentially very serious consequences raising from being caught possessing/distributing such material, no single individual is willing to share it, except with close friends. Turtle wrote:When designing Turtle, we were inspired by the way people living under oppressive regimes share information deemed "hostile" by their government (this can be books, newsletters, video and audio recordings, or even political jokes). ![]()
0 Comments
Leave a Reply. |