333.i2p

Форум, посвященный разработке и поддержке i2pd
Sun, 19 Mar 2023, 04:18pm Mourning the loss of zzz for I2P »
In-seriousness
Участник
Dfca_digital-feudalism-counter-action_v2_profile
Registered: March 2023
Последний раз: Mon, 15 May 2023
Сообщения: 10

Thanks for the added context.

Unsure if one religion is at the heart of this but I too deleted (or stopped) the torrent download from i2psnark but yes the download restarted and I couldn't workout out why or how; It was not in i2psnark. While it was downloading I hurried to stop the router. I also clicked the update heading and it went to this page (http://127.0.0.1:7657/configupdate) and from there I set the "Update Policy" to "Notify Only".

idk seems ok, but the way he develops is strange, Gitlab requires javascript. He also seems too interested in porting I2P to Go, which is a threat in itself depending on your threat model.

The general trajectory:

Taking a long view of I2P, we can see that the threat appears to be based on Bitcoin's I2P adoption. We now have Twitter owned by Elon, a known shitcoiner and distraction merchant, confidence trickster, scammer, beneficiary of DARPA and cheap credit, and he and his terrible ideas are supported by the fakestream media. Bitcoin Twitter is likely being undermined as we speak. We know Tor is largely a controlled network now. Their failure to address the Cloudflare Menace in any meaningful way early in its internet takeover is an obvious sign that they are controlled.

I've been studying the I2P network for a while in relation to the digital feudalists and noticed that Akamai and Elon-owned servers were quite commonly being connected to. To a slightly lesser extent Cloudflare, Amazon and Microsoft but will double-check my numbers from a while back. All of these companies have clear links to US military and depend on the USD.

Anyway we may want to block them to avoid further attacks? When I block them I don't seem to have any issues.

Akamai
------
A big network. Resources used to glean ASNs include this (archived) one https://web.archive.org/http://security.stackex...

The following known (ie. there may be more) ASNs are AS701 (imported by AS31377??) (incl Saranac, Verizon, Amazon), AS1299, AS6461 (imported by AS31377) (incl zayo, fastplanet, telstra, superloop, digitalEnergy, h4y, integra, pccwGlobal), AS7545 (!!!not all are akamai, manually crop!!!), AS8918 (CarrierOne?), AS12222, AS16625 (incl starhub, telstra, mobTelecom, embratel.net.br, emix.net.ae, taiwanMobile), AS16702, AS17334, AS18680, AS18717, AS20189, AS20940, AS21399 (imported by AS31377), AS22207, AS23454, AS23455, AS30675, AS31377, AS35993 (incl telstra.com), AS35994 (incl transTelco, durand.com.br, telstra), AS36183

Amazon
------
NOTE: for (partial danger) AS54113 use the following bash command to remove non-amazon ranges:
grep -iB 2 'AWS\|amazon' FILEPATH_TO_WHOIS_OUTPUT > $(date "+%4Y%m")_00_amaz-AS54113-ofFastly.whois

AS7224, AS8987, AS14618 (aws, many different site services incl. atlassian), AS16509, AS38895 (also incl Amazon Asia-Pacific Resources Pty Ltd, Amazon Data Services Japan KK), AS39111, AS46489 (twitch), (partial danger) AS54113 (!!!see above to strip non-amazon from aws-fastly!!!)

Cloudflare
----------
AS13335
AS14789
AS132892
AS133877
AS139242
AS202623
AS203898
AS209242
AS394536
AS395747

Microsoft
---------
Ranges published by the Microsoft itself at https://www.microsoft.com/en-us/download/confir... . Another resource is the 'Goodbye Big Five' firewall project, weirdly hosted on GitHub at https://github.com/dmehrotra/GoodbyeBigFive

AS3598, AS6182 (?), AS8068 (M'soft Edge), AS8069, AS8070 (M'soft Federal), AS8072 (?), AS8075, AS8812 (Temp Object), AS13811 (?), AS20046 (?), AS23468 (Xbox), AS26222 (?), AS36459 (github), AS62540 (Drake Holdings?)

Oracle
------
AS792
AS1215
AS1216
AS1217
AS31898

Musk
----
AS4764 (!!!only 1 prefix for tesla engineering group in this ASN!!!)
AS7545 (!!!only 1 prefix for tesla engineering group in this ASN!!!)
AS13454 (twitter)
AS14593 (starlink, spacex)
AS17536 (!!!only 1 prefix for tesla engineering group in this ASN!!!)
AS18196 (starlink, spacex, incl india? 103.171..)
AS34602 (starlink)
AS35995 (twitter)
Not AS36492 (see google)
AS49854 (starlink russia)
AS50494 (starlink ukraine)
AS204791 (starlink crimea)
AS264228 (starlink/blink brazil)
AS394161 (tesla)
AS394363 (tesla)
AS394943 (tesla)

Google
------
TBC: it was discovered that AS54113 (Fastly) leases IP ranges to Google and does not label them!
AS15169
AS22577 (?)
AS22859
AS36039
AS36040
AS36384
AS36492 (involves SpaceX/Starlink)
AS41264 (incl Google IT)
AS43515
AS45566
AS394507
AS394639 (inactive, 0 CIDR, according to ipinfo.io/AS394639)
AS396982 (GCP, 'cloud' services)

Facebook
--------
AS32934
AS42138 (metaInc)
AS54115
AS63293

Apple
-----
AS714

To process these ASN you'll need a liitle python helper script. It collapses IP address lists so that for example your firewall only needs to process one IP address range, like 99.128.0.0/9, rather than:

99.160.0.0/11
99.162.0.0/16
99.162.1.0/24
(etc)
99.192.0.0/10


## PYTHON SCRIPT: IP Range Collapse
## --------------------------------
##
## Make a little helper script that can be used to pass a file to a built-in
## python3 function, collapse_addresses.

echo '#!/usr/bin/python3

from sys import stdin
from ipaddress import ip_network, collapse_addresses

networks = []

for line in stdin:
networks.append(ip_network(line.strip()))

for addr in collapse_addresses(networks):
print(str(addr))' > IPRangeCollapse.py

## Make the file executable:
chmod +x IPRangeCollapse.py

I might as well put up the entire thing, now. It includes the collapsed IP addresses...

-----
-----
-----

[b]TO BE CLEAR THIS IS ME PUBLISHING AN INTERNET LAW. THE 'DIGITAL FEUDALISM COUNTER ACTION LAW'.[\b]

It's a law that anyone can read and use and its licensed by an amended GPLv3 that precludes employees of DIGITAL FEUDALISTS from working on it. Anyone with a linux system with 'iptables' should be able to follow it. It blocks entities like Cloudflare, Amazon and Google, that control more than 1 million IPv4 and other criteria.

I've been postponing publishing due to a minor bug where the 'blamed' application is very occasionally the wrong application. Also IPv6 is untested.

Public key is below and also here http://o7jgnp7bubzdn7mxfqmghn3lzsjtpgkbnpjjsn6d...

The Digital Feudalism Counter Action (DFCA) Law designed for even 'non-power' linux users to read and run:
http://o7jgnp7bubzdn7mxfqmghn3lzsjtpgkbnpjjsn6d...

The PGP signature for above file:
http://o7jgnp7bubzdn7mxfqmghn3lzsjtpgkbnpjjsn6d...

I hope it is ready, if someone wants to try it out please tell me how it goes. Walk through the steps slowly, please.

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQINBGQXBYsBEADgeiXwJ14HTxZDmT7zFc7HQbI6NfCEWVB86sc4jCfQSECuA5MT
qTQyBLCHg8RsG0hbBmi4nuleuX16t359u5bhoOQ88g5ln3pt1lu5Xp4OB5kEXrA3
bJLP2FwUobNVJEUkChMKdP3cxzYh9amNsSwCYFpJhG0ipTPH83zstBcx5RRR5Lzq
d6yzdZAXxrm0s41XkixGyJeXkTV+fewu/uODvuuIc87B5ZrcrpOxN3YARPLOo/nR
4Tysek2KwhlLjN0DkMKyfhibapAfd9y3Hmg5Zt15zXFOmswW9N3hRxCZU3M0oLOy
x0UBaKOf1/NfHdxk4avzLea0kQ8nu9+tL9V6iVyIeHKF0r7MXE0NLj0pxMB3xzyT
BISYw8CIKjR4dlEk4NpKEb4X9rGzUQv7FIaZb52gsVcMmKaZFaJzF2fIwn5wCARp
/33pJ/fGegQ38qqVqXlSyGcPjHuhyC9zZwFZr35Juml8TnZnHgtD7ra7hDfYnUa0
9c7KR+G7gIM2+cCA0eHvojwZn4BDTi8d9bh5bKeSyawugU+Sajwg3tFXjisLYQUz
aMaAQTPB2YycLOl44nJznmeqoNRJlBVmdOlDDebRQffsq0owa+CLu3xckeQCYOlc
xC1mIi00EH7XhhJQo2m4c3AevQVBgPvv9ob/l67tV4ZKw1hzDwLPSs25DQARAQAB
tJ1VbnNlbmRlciAoT3JpZ2luYWwgcHVibGlzaGVyIG9mIHRoZSBEaWdpdGFsIEZl
dWRhbGlzbSBDb3VudGVyIEFjdGlvbiBMYXcgcmVsZWFzZWQgaW4gTWFyY2ggMjAy
MyBvbiBhbiBJMlAgZGV2ZWxvcG1lbnQgc2l0ZS4pIDx0aGlzLWVtQGlsLWRvZXMt
bm90LWV4aXN0LmZha2U+iQJOBBMBCAA4FiEEomQIuwY/4AGLGjfM9mO+m+kydI8F
AmQXBYsCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQ9mO+m+kydI9IZhAA
xa5uhSnJDBWI9vqrd1S7kuOqogDJNSK4Ieg+2UKBZscC960i8fTQXtVrivc91+JX
bCqi/2AWlVjoOFscZZZXNEYYg27w5NGyaPpRRbCgvaTTe4UOCxTF0m/OA4Rf8r2R
FeQIdDgGci+VbMpksmmkoP6Bm5WeKw0tcpvfsFsG5XkAiXmFEXKcRoVnAtmIvCbS
haecbGHMhUSovi3xq+raqb9uC9BQKoh+zdAgpAikxzqmN2UFbIbtssUGFdwCERRn
Okb/3kEjKsVwMuoPWAE3FFx2xvt//a8lCB85l6G8u+mgGybs2AyGotVFQyolWBXF
TtMggRkDloLbOPgrrF2s4C+xqXK9M5HkdoXPRRaTVExiLGNo9ObsN06pkZ8eJpzv
Aq+EALEtY8gWknAFNr8NyptMEM16IK6OulxP+8GtZ8c/nTWp7Zp5H7NtqZogeaH4
kGyTAw2xEK5NwdThQljY0xME5x5XMXkhga/y6PQI3zgJMx1HxpKpYRLzwChSl32C
RhcQN1ukiDXhj7erl+dBef9+72xHQPb1pxIW4GvsAWHlfMYtPBwLadrvj4O09X4f
mxEFTJZtdcJGZUEijXhG8W1+FdP0/yUlpmWeOc3vhzYulFoaCDR54pj0PMDsMA+s
vWn8gOisxM5O+O3M4EqX7FtwyjsvureGhFtiZQ62/iu5Ag0EZBcFiwEQALfVrhzm
0ZNQyvspcha/jANoUmzVIiFv7dAjYNaKi+WrqY5HjmjQ7GGSM8G8ro3fJc3yki1X
4/GZgE2Hp5oejUDbz4Lfc1bKcnlKdG33AhM4MovhdT0hSjA6FSD+qdcNjhUFToaA
mERYHQ7iCFDkEQDZElgeagb+wef+yIWUzjXmm0AZQbTzcKgjXMHe1nUGAvnd5HuN
pTbryh+4PaeIf5CfGxdLbw915E41ks1lpnUhyNDFfhzfDXj5/lDDKH3vRCs+2DbH
XWelImTWuAMw4R9cuqx4eVLjogZ0WY22X1nAKHIvFerf7TZGROiiG51i08M8uXwy
FyrS24La7o2i2lghP22pFY6mWgJ73vYiwd4spRgWt5sW76+HaVR/AfRwMtaxrDw1
p+S9Z6cI+4Ay6228G3ScaCBnO/qFXn6bsMxQz/7YPYr/1NKUY0BrEEDN2eXPxDdN
cuyAOJD8e+iqpp5/r75uo8L1jILu/84vDfvtuxvUDTPyl2jqbFIj41+CtT+KK1PS
F+9yJiww17grYAN1Fw71Jn6u+mMPYkYi7w1PQj6kkfsJnFVmBdNWMZHxQv4u9VN9
FDmH33yqElXmCAU0gnONinlCtCHx9vIgfA5tuuV8RVnRR3rgJEUPbXmmtfV+dMdy
gd2pC1aLo0ocP3W8tCXxEyZpaWQM+4Zv1jfZABEBAAGJAjYEGAEIACAWIQSiZAi7
Bj/gAYsaN8z2Y76b6TJ0jwUCZBcFiwIbDAAKCRD2Y76b6TJ0jwsbD/0ZItvJGKfD
bx7bSsdjr3J0mhDcbbbIw9E90nL7kHbfxEtqB0R/e1V4IONWRCkJxUybuii10jW7
DnUFLVtIQqTUThdA9890z4ATNtLg8AJ/PnEBBUscI3xKF4dP0uESZuHo152rrkNA
8nXLt+iNDbBSxmaeDIq5+ghTasXo7/DkRBP7/5OzDYa77paXBvOmPeOnFL2SDRoE
I6UQDhU3peDPwRUN/Y1ymbboQTv0ulhMaRC0CF8+9KDkJ1e20rqVObu70dOGN0Dj
7UXBiWZ+blOKsrOc1RKRy36lsutD4u2XGnzLARdkf7OtQpNrQZYfN+jKSMaybkPC
YbHNlWpkCw15Li7nLN1ZenYInhJKGA7xzjfWb2e5SnmD90yyZw9exV7HBElx7+7z
hxNainHB+wC8tsJHNAf/zWHSGUjH2TbIU9P+k7CVk657bN+L4WMWqaRrIcUmXT6G
5FxoZFeNAn653WJ8ZuGVp38EbWSyP0CB2MeU6qQTLQsMivGt0BWpMnr87LO+YJA6
8070l5fRc7S1ukmpN/aVDbrgM5URjugQ0UVCcPbhN/Z3Uc0CciByQ99DHK3aKoJU
yLJz/lrXOgKFVD8CbjYl0B52TO9/7EF2XQH2qUM6le/EhrX9oQhZoXMqdhczsfJS
Xh0uAiBxNcVTzdevr7UY3s5yRt6OWd8cHw==
=eglv
-----END PGP PUBLIC KEY BLOCK-----

Offline