Bitcoin Forum
May 09, 2024, 08:41:55 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: I2VPN- Anonymity guaranteed, free your freedom!  (Read 1836 times)
Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 21, 2016, 10:34:01 AM
 #1

I2VPN - Real anonymity, with guarantee, don't trust us, nor do we you.

I2VPN is a new type of VPN that guarantees your anonymity, no strings attached.

How?

(Short from website)

Do you know about Tor? Do you not? Read below. (Those who do, don't read below, go ahead)

Very short answer

TOR stands for "The Onion Router." It is software that is free to use, and written for the purpose of allowing people to browse the internet without being identified. Ideally, you can access websites without anyone knowing that you actually accessed them.

Longer answer

A description of what TOR is and how networking works

Computer networking involves what is called the OSI model - essentially, everything can be reduced to a sequence of electrical signals through network cables, but you can organize this into different "levels" or "layers" to make things easier to understand, the same way that you could technically think of an organism as a clump of atoms, but you organize this in your mind into biological components, cell structures, entire cells, tissues, etc. On one layer, you have a nucleus, mitochondria, etc, and on another you have organ systems; thus in networking, you have a network interface card, MAC address and ARP packets on one level, and HTTP, domain names, and FTP on another.

When you open up your web browser and access websites on the internet, your computer will send packets of bits through your network to your ISP, and they will eventually reach the intended destination if everything goes correctly. If you have a tool like Wireshark or tcpdump, you can watch this as it happens.

Let's say for a moment that you want to access www.reddit.com, so you punch it into the browser and press enter. Assuming that the domain name "www.reddit.com" can be resolved to an IP address that can be reached, your browser will first begin a TCP handshake sequence with Reddit's server to ensure that data can be reliably sent from you to reddit and back. If this suceeds, your browser will then begin exchanging HTTP requests with Reddit's HTTP server - note that you can use the term "server" in many ways; an HTTP server is specific software (like Apache or Microsoft IIS) that can take HTTP requests (which are simply large amounts of formatted text data), do stuff with them, and send back responses. You could also have a network server that can have requests made to it in different protocols and provide responses.

TOR is called "The Onion Router" because it is an implementation of the idea of Onion Routing. Normally when you go to do what I just said with accessing Reddit, your network traffic can be traced back to its source IP address (which can be isolated to your machine itself, or to your router - tracing an IP address can get tricky when dealing with subnets and NAT devices). What TOR allows you to do is re-route this traffic through a network of other computers to make it more difficult to trace your packets back to you. You can send your traffic to an entry onion router that passes it through several routers before it reaches an exit node and is sent to its intended destination.

Onion routing revolves around the idea of "layering" cryptographic protocols. Tor operates with TLS, under which a separate Diffie-Hellman key exchange occurs, and also according to this paper from the Black Hat briefings there is some implementation of AES as well.

There are also some sites (like Silk Road or The Hidden Wiki) that you can't access without going through Tor. I'm not quite sure how these work, but a lot of them are used to exchange questionable material - if you are looking for it (which, for the record, I am not and have not), you can find drugs, child pornography, and even hitmen to hire. There is also less illegitimate stuff, like political texts, computer books (which are usually in violation of their copyright), music, etc.

(Credit: https://www.reddit.com/r/explainlikeimfive/comments/1jrnff/eli5_tor_how_it_works_what_can_i_do_with_it_and/cbhozmc)

I2VPN is based on a Tor-like network I2P, which has been around since Tor was, and has a active community and development.
Simply, I2VPN is a service that helps you pseudonymously browse the internet and clearnet (you can torrent your files, use any high-bandwidth services) without lettting the site know that where you are, and protects sniffers know what websites did you visit, what did torrent, and such..

A common use of I2VPN will be to use torrents, I2VPN is also cheap than most of the other VPN services floating in clearnet, but this price doesn't deprive your security, which we take first in all, because I2P secures you even if the exit we use is not trusted.

For those who understand Tor in a bit: This is a kind of you connect to a hidden service: it allows you to browse some websites, as the hidden service doesn't know who you are, clearnet does not either..
This is a in a nutshell description of I2VPN, what it would be in Tor, but sadly OpenVPN in Tor does NOT work.

Actually, I2VPN looks simple to the end user but in fact, we had to do some real hard work to get this done..

Website: http://exooqgycf4hbfevw.onion/
Clearnet: http://exooqgycf4hbfevw.onion.link
BTW: If your AV says this link contains malware, it's a false positive,
Many onion links have bad things stuffed in them, a abuse of Tor.
Here is our virustotal scan link:
https://www.virustotal.com/en/url/06d5caa592702cc1b3c3197c323f81d1bb277c766dd4ea3c692d90780097b3df/analysis/1461831813/
I2P B32 link: http://bduw26oby3cjuwihuxbf6ruhyydupu43bpr4su23pdzugsnhh4ha.b32.i2p/

If you do some research about Tor & I2P, you will know what I'm talking about..

Cheers,
Pkzone Smiley

1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
The grue lurks in the darkest places of the earth. Its favorite diet is adventurers, but its insatiable appetite is tempered by its fear of light. No grue has ever been seen by the light of day, and few have survived its fearsome jaws to tell the tale.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
1715244115
Hero Member
*
Offline Offline

Posts: 1715244115

View Profile Personal Message (Offline)

Ignore
1715244115
Reply with quote  #2

1715244115
Report to moderator
MagicIsMe
Sr. Member
****
Offline Offline

Activity: 294
Merit: 250


Negative trust resolution: index.php?topic=1439270


View Profile
May 21, 2016, 12:34:34 PM
 #2

Your security with that VPN depends on your peers then. So not much privacy if there's only one user connected.

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 24, 2016, 06:37:56 AM
 #3

Your security with that VPN depends on your peers then. So not much privacy if there's only one user connected.

Yes, that's true, but if this grows and has enough users then the internal mixnet would function..

Well, if you are on clearnet using I2VPN. none can really know who are you, your IP even if one user is on network..

Regards,
Pkzone

frei
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
May 29, 2016, 03:19:58 PM
 #4

Hi Pkzone,

your service sounds really interesting. I have two questions:

- Speed: At the moment I use two different vpn-providers and chain them with an openvpn-tunnel in a openvpn-tunnel. The speed drop is from 80 MBit to 50 Mbit, which is OK for me, because I route through 2 different countries. Did you make any speedtests?

- Security: You write, that your service is more secure, because: "we log but what will we get from logging OpenVPN servers, all we see in your log is: “Client from 127.0.0.1 connected to 127.0.0.1”, it’s because that we use I2P and I2P provides you with anonymity." (http://exooqgycf4hbfevw.onion.link/for-geeks/)
But you have the control of all the servers, so I think it is possible for you and your team to get a connection from the real IP to the exit IP, or?

But if you need an additional customer: PM me, I would like to test your service (and have enough BTC)
You have here at the forum not a lot of feedback Why do you not discuss your servie/idea at https://www.reddit.com/r/VPN/ ?

frei
jambola2
Legendary
*
Offline Offline

Activity: 1120
Merit: 1038


View Profile
May 29, 2016, 05:54:15 PM
 #5

I've tried accessing your website, but it doesn't work too well for me.

The text is very hard to read firstly. I can see the home page, and view the "geek way" page, but whenever I view the "easy way" page, my browser just gives me a "Too many redirects" error and I am unable to access it.

No longer active on bitcointalk, however, you can still reach me via PMs if needed.
Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 31, 2016, 10:09:23 AM
 #6

Hi Pkzone,

your service sounds really interesting. I have two questions:

- Speed: At the moment I use two different vpn-providers and chain them with an openvpn-tunnel in a openvpn-tunnel. The speed drop is from 80 MBit to 50 Mbit, which is OK for me, because I route through 2 different countries. Did you make any speedtests?

- Security: You write, that your service is more secure, because: "we log but what will we get from logging OpenVPN servers, all we see in your log is: “Client from 127.0.0.1 connected to 127.0.0.1”, it’s because that we use I2P and I2P provides you with anonymity." (http://exooqgycf4hbfevw.onion.link/for-geeks/)
But you have the control of all the servers, so I think it is possible for you and your team to get a connection from the real IP to the exit IP, or?

But if you need an additional customer: PM me, I would like to test your service (and have enough BTC)
You have here at the forum not a lot of feedback Why do you not discuss your servie/idea at https://www.reddit.com/r/VPN/ ?

frei

Yes, frei, I did PM the owner of r/VPN and he hasn't replied to me...

I was busy a lot, these days, if you want to catch me, feel free to drop at Irc2P or OFTC at #salt and #nottor respectively...


Hmm, Speed: Yes I tried the speed but I was using Zenified's server as main node and my server as exit, the speed was 10 MBps after a lot of optimization and bulking and division of tunnels...

Security: No, we in no way can figure out who are you because, I2P makes you anonymous... Well, if you access a site using Tor/I2P, can the HS/eepSite owner know who you are? He at maximum may see a IP in his 127.* due to "Unique Local Address Per Client" Setting, so, you are Perfectly anonymous. Smiley

I need customers for sure, and for now, I need 2 users to start...

Funding status is on my main website:

http://vtgmnszxtffi76lo.onion.link/funds/

Or for I2P users: http://kwjxeh5qcdj2qhahhlvgibzmebuefbfeo7tu2mhpvv4fzjh4gf5a.b32.i2p/funds/

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 31, 2016, 10:10:44 AM
 #7

I've tried accessing your website, but it doesn't work too well for me.

The text is very hard to read firstly. I can see the home page, and view the "geek way" page, but whenever I view the "easy way" page, my browser just gives me a "Too many redirects" error and I am unable to access it.

That's unfortunate, but really the problem isn't ours, many were complaining about the font, so I changed it, well, if "Too many redirects" happens, it's because of Tor2Web server, try a different proxy or use TBB.

Regards,
Pkzone, you neighbourhood programmer Smiley

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 31, 2016, 10:13:02 AM
 #8

DISCLAIMER: Frei is a first time user, I swear he's not a sockpuppet from me.

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 31, 2016, 12:33:01 PM
 #9

Hi Pkzone,

your service sounds really interesting. I have two questions:

- Speed: At the moment I use two different vpn-providers and chain them with an openvpn-tunnel in a openvpn-tunnel. The speed drop is from 80 MBit to 50 Mbit, which is OK for me, because I route through 2 different countries. Did you make any speedtests?

- Security: You write, that your service is more secure, because: "we log but what will we get from logging OpenVPN servers, all we see in your log is: “Client from 127.0.0.1 connected to 127.0.0.1”, it’s because that we use I2P and I2P provides you with anonymity." (http://exooqgycf4hbfevw.onion.link/for-geeks/)
But you have the control of all the servers, so I think it is possible for you and your team to get a connection from the real IP to the exit IP, or?

But if you need an additional customer: PM me, I would like to test your service (and have enough BTC)
You have here at the forum not a lot of feedback Why do you not discuss your servie/idea at https://www.reddit.com/r/VPN/ ?

frei

Oh, and "You have here at the forum not a lot of feedback"...
Hmm, that's because most of the users are so dumb that they use Windows, the reason I don't want I2VPN to be used with Windows, is that Windows DOES NOT RESPECT your privacy... The reason is here https://www.gnu.org/proprietary/malware-microsoft

Even tho Windows is in theory supported by I2VPN, it works with Windows but not confirmed but should work with the anonymizing middle man system,,

Hmm, and I am here in forum for about a year, I don't have any trades here for sure but I am at #nottor a lot of days and #salt after some days, if you ask them, you will know that when I eventually arrived there, I was a complete noob at security, I had my days, and now here I am... 2$ Is what CSGO players donate to any random streamer at twtich.tv, if you can't trust me with these bucks, then you are kind of weird?

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
May 31, 2016, 01:53:31 PM
 #10

Thanks to ryonaloli, I accept escrow, that means.............

YOU RISK NOTHING!

As soon as I get 2 users willing to buy for more than 3 months, I2VPN Journey begins!

I2VPN funding complete..

http://vtgmnszxtffi76lo.onion.link/funds/

frei
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
May 31, 2016, 06:55:41 PM
 #11

DISCLAIMER: Frei is a first time user, I swear he's not a sockpuppet from me.

Thank you very much for this statement.  Smiley

Back to the concept: Do I understand your concept, that you own the entry- and exit-points? So I think it is the same marketing as "multihop" vpn-providers, which solves some problems, but not the main problem: You need to trust the operator.

For example: If you look at the FAQs from Jondonym: https://anonymous-proxy-servers.net/en/faq-jondo.html#1b
"A Mix Operator can only determine a relationship between the incoming and outgoing connections to his mix server and must, in fact, do this to ensure that the data packets were correctly transferred. If the user uses a mix cascade consisting of more than one independently run mix, the mix oerator of one single mix in the chain cannot determine a relationship between the user and the websites visited. For this reason, we especially point out that the "Dresden" mix cascade is for test purposes and is run solely by members of the TU Dresden. Whoever uses this cascade is protected from external observation, but the TU Dresden could theoretically observe everything."

But it could be, that I do not understand your concept correct. Can you please explain the difference to this Jondonym, or TOR?

frei
Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 01, 2016, 09:48:00 AM
 #12

DISCLAIMER: Frei is a first time user, I swear he's not a sockpuppet from me.

Thank you very much for this statement.  Smiley

Back to the concept: Do I understand your concept, that you own the entry- and exit-points? So I think it is the same marketing as "multihop" vpn-providers, which solves some problems, but not the main problem: You need to trust the operator.

For example: If you look at the FAQs from Jondonym: https://anonymous-proxy-servers.net/en/faq-jondo.html#1b
"A Mix Operator can only determine a relationship between the incoming and outgoing connections to his mix server and must, in fact, do this to ensure that the data packets were correctly transferred. If the user uses a mix cascade consisting of more than one independently run mix, the mix oerator of one single mix in the chain cannot determine a relationship between the user and the websites visited. For this reason, we especially point out that the "Dresden" mix cascade is for test purposes and is run solely by members of the TU Dresden. Whoever uses this cascade is protected from external observation, but the TU Dresden could theoretically observe everything."

But it could be, that I do not understand your concept correct. Can you please explain the difference to this Jondonym, or TOR?

frei
No I don't own the entry and exit points, do you know what I2P is?

If you access a Tor hidden service, does the hidden service owner own the entry?

You entry to I2VPN using I2P, that means, I2P will route your traffic via a group of computers which I don't own, neither do you, so after reaching I2VPN main, I can't trace those traffic to your IP, but to your computer using I2P tunnel, then, I2VPN main will connect to I2VPN exit using I2P again, so exit can't find either main nor you...

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 01, 2016, 09:51:25 AM
 #13

I think..

I2VPN differences with Tor:

Exits are owned my me & my team.
More hops.
Multiple layers of different cryptographic algorithms.
I2VPN Main is a trusted middleman gets your traffic via I2P.
I2VPN exit is a Untrusted disposable computer which receives traffic from I2VPN main via I2P again and just sends it to your required destination.

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 01, 2016, 09:52:21 AM
 #14

Anyway, this is my 300th post..

Can you hit me up on Tox, I can explain it better that way...

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 01, 2016, 09:56:38 AM
 #15



Look here, between I2VPN Trusted Main and I2VPN Client there is a set of unknown, untrusted, random computers which is not owned by either you or me who just route this traffic without any interference (it's not possible to interfere), when it reaches either your computer or main, both don't know anything except your & main's I2P addresses, this may be highly technical but if you research it, you will know what I am talking about.

Regards,
Pkzone Smiley

mmboulhosa
Full Member
***
Offline Offline

Activity: 140
Merit: 100

★YoBit.Net★ 350+ Coins Exchange & Dice


View Profile WWW
June 01, 2016, 11:07:40 AM
 #16

Seems good. May be interested in asking more questions. Mind private messaging me, or adding me on skype (Agonises)

██████████    YoBit.net - Cryptocurrency Exchange - Over 350 coins
█████████    <<  ● $$$ - $$$ - $$$ - $$$ - $$$ - $$$ - $$$   >>
██████████    <<  ● Play DICE! Win 1-5 btc just for 5 mins!  >>
Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 01, 2016, 11:27:59 AM
 #17

Seems good. May be interested in asking more questions. Mind private messaging me, or adding me on skype (Agonises)
Why Skype? Go Tox!

If you have any questions: PM me straight away (or even if it's a Hi).

frei
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
June 01, 2016, 06:58:30 PM
 #18


No I don't own the entry and exit points, do you know what I2P is?

If you access a Tor hidden service, does the hidden service owner own the entry?


Your Website and your description was not detailled enough. You never said which part of the chain are your servers. Now I understand your concept. If you look at the concept of JonDonym, they own all servers in the chain and that was the reason why I asked about it.

But if you only control the exit-server the cascade before is the "public" I2P-network with all the performance-issues. It is more secure, because I really do not have to trust you, the only thing you can do, is to combine username with visited sites, but you can not see my IP.

I would like to test the speed and software. Please PM me and I will send some monex.
Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 02, 2016, 08:39:01 AM
 #19


No I don't own the entry and exit points, do you know what I2P is?

If you access a Tor hidden service, does the hidden service owner own the entry?


Your Website and your description was not detailled enough. You never said which part of the chain are your servers. Now I understand your concept. If you look at the concept of JonDonym, they own all servers in the chain and that was the reason why I asked about it.

But if you only control the exit-server the cascade before is the "public" I2P-network with all the performance-issues. It is more secure, because I really do not have to trust you, the only thing you can do, is to combine username with visited sites, but you can not see my IP.

I would like to test the speed and software. Please PM me and I will send some monex.
Well, that's why I said the infrastructure is highly technical, I usually clear users' doubt myself because some may have problems.

I'm happy you get this and I hope this discussion will also help others to get it...

I'm PMing you with some info...

Regards,
Pkzone -> The neighbourhood programmer.

Pkzone (OP)
Full Member
***
Offline Offline

Activity: 154
Merit: 100


I2VPN Lead developer.Antidote to 3-letter agencies


View Profile WWW
June 05, 2016, 07:22:56 AM
 #20

Update: We are switching to OpenNIC, RIP ICANN and their funny corporate TLDs.

Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!