this post was submitted on 26 Jul 2025
1039 points (99.2% liked)
Technology
73254 readers
3846 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
At this point Dark-web tech needs an upgrade, we might just need a "2nd internet"
i2p
That moment when you decide to use i2p because its more sustainable for every user to be a node just for your server's location to get leaked in a vulnerability. This is why most deep web migration to i2p ended
Have any links or extra info on that?
I don't really have a link, but you might be able to find something talking about game server protocols. Outside of LAN, usually you're either connecting to a central server, or a peer relay. With a relay server it's just a proxy between you and the other players to hide your IP from others.
There's plenty of cases in games that didn't do this where malicious actors could find the IPs of the people they're playing with and DDoS them to give themselves an advantage. Knowing someone's IP will also probably tell you extra info about them like what city they're in, and open them up for further hacking.
i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). https://nvd.nist.gov/vuln/detail/CVE-2023-36325
I must have missed that. When did that happen? I used i2p a long time ago and it seemed very promising. I imagine it has got better since.
How about Gemini? https://geminiprotocol.net/
How it applies to geolocation and server hosting in light of the OSA I really have no clue. But it's an interesting underground hacker/tinker type alternative.
did this or the google ai thing came first?
This says it started in 2019, Google Gemini was 2023. It seems like these big companies pick a name first and then figure out who they'll have to sue after.
Social/Political problems need social/political solutions, not technical solutions.
Hiding from the people oppressing you is pretty political