On Thu, Jun 23, 2016 at 3:51 PM, grarpamp grarpamp@gmail.com wrote:
Freenet has talk on their lists of adding 100 new onioncat nodes to tor and i2p as linked to in this thread...
https://lists.torproject.org/pipermail/tor-dev/2016-June/011108.html
More folks blogging related to the above...
http://mh7mkfvezts5j6yu.onion/2016/08/18/using-freenet-over-tor.html
This post outlines a method of using Freenet over Tor based on posts I wrote on my Freenet hosted blog and subsequent discussions about it. If you read my Freenet hosted blog there's little new here, I'm just making it available on my non-freenet blog. One issue I've had with Freenet is that it exposes your IP address to peers. Recent law enforcement efforts to monitor Freenet have shown that they have been able to obtain search warrants based on logging requests for blocks of known data and associating them with IP addresses. If law enforcement can do this, so can random bad people. You can avoid exposing your IP address to random strangers on opennet by using darknet but even then you have to trust your friends aren't monitoring your requests. If it was possible to run Freenet over Tor hidden services then only the hidden service address would be exposed using this logging method. A problem is that Freenet uses UDP which Tor does not support. https://emu.freenetproject.org/pipermail/devl/2016-June/039056.html A recent post on the Freenet development mailing list pointed out that onioncat provides a virtual network over Tor and tunnels UDP. Using the steps they provided, and some tweaks, it's possible to set up a darknet node that doesn't expose its IP address. It uses the onioncat generated IPv6 address for communicating with peers - and this address is backed by a Tor hidden service. The steps below outline how to set this up. ... details inside ...
https://lists.cpunks.org/pipermail/cypherpunks/2016-October/032674.html
I've been taking a somewhat different approach. I'm also using OnionCat, but I focused first on anonymously reaching peers via the open Internet. I have a node that hits the Internet through an "anonymous" VPS proxy. The node reaches the proxy via IPv6 OpenVPN via OnionCat. The node binds locally only to tun1, and in the proxy, tun1 forwards to eth0.