Предлагаю обновить ссылку на флибусту
http://xcktsvspaz4iu24g65vuzuvoagqzfilqaa6h5btg...
Нашёл тут
http://r4sas.i2p/index.php?entry=%C7%E5%F0%EA%E...
Fri, 25 Aug 2023, 12:30pm | Добавить свой сайт на i2pd.i2p » |
---|---|
|
Предлагаю обновить ссылку на флибусту
Нашёл тут
|
Offline | Link |
Mon, 21 Aug 2023, 09:05am | Добавить свой сайт на i2pd.i2p » |
---|---|
|
Привет. Предлагаю свою недо радио станция : http://kasy-radio.i2p/
Баннер: http://kasy-radio.i2p/baner.png п.с нету смисла моево проекта лол ;) |
Offline | Link |
Sun, 20 Aug 2023, 09:01am | Добавить свой сайт на i2pd.i2p » |
---|---|
|
librarian.i2p сайт хороший, я не создатель, но если добавите, баннер нарисую! |
Offline | Link |
Mon, 31 Jul 2023, 03:44pm | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
zpkg & junest I've been on a bad streak lately. Everything I tried did not work. I've spent 2 hours on zpkg and 2 hours on junest. None of them worked for me. I tried some other things like gentoo for Debian (sudo apt install gentoo). Nothing worked. Has anybody got something i2p related with zpkg or junest? https://ihucos.github.io/zpkg/
|
Offline | Link |
Sun, 30 Jul 2023, 08:02pm | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
Probably snap-version stored files on /var/snap/i2pd... |
Offline | Link |
Tue, 25 Jul 2023, 01:53pm | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
I gave up on Ubuntu and i2pd 2.48. There are to many problems with both. This is from a very good router:
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
This should be probably in a new topic.
|
Offline | Link |
Mon, 24 Jul 2023, 11:07am | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
sudo du -shx ~i2pd/[pn][e]* 17M /var/lib/i2pd/netDb
If they are too big - you may remove this two folder preventive. |
Offline | Link |
Thu, 20 Jul 2023, 06:42pm | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
Both snapstore and github downloads are not available anymore. It appears that the flatpak too suffers from the problem. amnesia@amnesia:~$ top -b | head
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
I will try to troubleshoot further to see if it has to do with NetworkManager or some other OS thing. Currently my suspicion is the router 60%. Check also the reviews from the snapstore. I have older routers that are running fine at 60% tunnel building so I do not suspect any general attack. |
Offline | Link |
Thu, 20 Jul 2023, 08:02am | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
Show output while i2pd running:
|
Offline | Link |
Thu, 20 Jul 2023, 04:02am | i2pd 2.48 & Snap Store Negative Reviews » |
---|---|
|
I had a Snap Store router installed with gnome-software Ubuntu Jammy stop building tunnels after 10 hours. I can't post logs because the whole test OS died. I saw a lot of negative reviews too. Can anybody confirm the story? I tried another router with the github binary install and a similar thing happened.(Ubuntu Jammy) |
Offline | Link |
Sun, 16 Jul 2023, 12:15pm | Добавить свой сайт на i2pd.i2p » |
---|---|
|
Добавлено |
Offline | Link |
Sun, 16 Jul 2023, 12:04pm | Добавить свой сайт на i2pd.i2p » |
---|---|
|
Русскоязычные адаптации материалов по общей-семантике
Баннер - http://333.i2p/files/logo_time.png |
Offline | Link |
Tue, 04 Jul 2023, 08:24pm | Constant Multicasts from Pidgin XMPP client » |
---|---|
|
It might be from the French riots. They attacked Tor and Tor downloads/updates. Even this site has login problems. They started to booby trap more than a few weeks ago. Usually things show on reboot if no-UEFI was used. I'm nowhere near the riots and I lost a lot of French based software. Try to see if Mik's tobrowser-downloader works. That is a sure test.... |
Offline | Link |
Wed, 21 Jun 2023, 10:32pm | Constant Multicasts from Pidgin XMPP client » |
---|---|
|
Every second, Pidgin attempts a multicast to 224.0.0.251 (UDP) port 5353. There is nothing about this on the web that I could find. I not running Pidgin with the --force-online option. Maybe I will try running with the --debug option. I block that address because I don't trust all devices on my LAN. I would rather disable this multicast in Pidgin. And not stop getting the messages from the firewall when app does something weird like this. Anyone know how to fix this broadcasting problem? |
Offline | Link |
Mon, 19 Jun 2023, 02:18pm | Пробема с android xmpp » |
---|---|
|
Self signed certificates are always a problem in Android. You can try this:
I faced this issue yesterday, while migrating our company's RESTful API to HTTPS, but using self-signed SSL certificates. I've looking everywhere, but all the "correct" marked answers I've found consisted of disabling certificate validation, clearly overriding all the sense of SSL. I finally came to a solution: Create Local KeyStore To enable your app to validate your self-signed certificates, you need to provide a custom keystore with the certificates in a manner that Android can trust your endpoint. The format for such custom keystores is "BKS" from BouncyCastle, so you need the 1.46 version of BouncyCastleProvider that you can download here. You also need your self-signed certificate, I will assume it's named self_cert.pem. Now the command for creating your keystore is: <!-- language: lang-sh --> $ keytool -import -v -trustcacerts -alias 0 \
PATH_TO_KEYSTORE points to a file where your keystore will be created. It MUST NOT EXIST. PATH_TO_bcprov-jdk15on-146.jar.JAR is the path to the downloaded .jar libary. STOREPASS is your newly created keystore password. Include KeyStore in your Application Copy your newly created keystore from PATH_TO_KEYSTORE to res/raw/certs.bks (certs.bks is just the file name; you can use whatever name you wish) Create a key in res/values/strings.xml with <!-- language: lang-xml --> <resources>
Create a this class that inherits DefaultHttpClient import android.content.Context;
import java.io.IOException;
public class MyHttpClient extends DefaultHttpClient { private static Context appContext = null;
public MyHttpClient(Context myContext) { appContext = myContext; if (httpScheme == null || httpsScheme == null) {
getConnectionManager().getSchemeRegistry().register(httpScheme);
} private SSLSocketFactory mySSLSocketFactory() {
final InputStream inputStream = appContext.getResources().openRawResource(R.raw.certs); ks.load(inputStream, appContext.getString(R.string.store_pass).toCharArray());
ret = new SSLSocketFactory(ks);
Now simply use an instance of **MyHttpClient** as you would with **DefaultHttpClient** to make your HTTPS queries, and it will use and validate correctly your self-signed SSL certificates. HttpResponse httpResponse; HttpPost httpQuery = new HttpPost("https://yourserver.com");
MyHttpClient myClient = new MyHttpClient(myContext); try{ httpResponse = myClient.(peticionHttp); // Check for 200 OK code
}catch (Exception ex){
|
Offline | Link |