diff --git a/i2p2www/blog/2022/09/26/i2p-safety-reminder.rst b/i2p2www/blog/2022/09/26/i2p-safety-reminder.rst index d4374086..23583f24 100644 --- a/i2p2www/blog/2022/09/26/i2p-safety-reminder.rst +++ b/i2p2www/blog/2022/09/26/i2p-safety-reminder.rst @@ -7,7 +7,7 @@ A Reminder to be Safe as I2P Grows :author: idk :date: 2022-09-26 :category: general - :excerpt: {% trans %}{% endtrans %} + :excerpt: {% trans %}A Reminder to be Safe as I2P Grows{% endtrans %} {% trans -%} A Reminder to be Safe as I2P Grows @@ -15,19 +15,11 @@ A Reminder to be Safe as I2P Grows ================================== {% trans -%} -It is an an exciting time for The Invisible Internet Project (I2P). We -are completing our migration to modern cryptography across all of our -transports, ( Java and C++), and we have recently gained a high-capacity -and professional outproxy service, and there are more applications -integrating I2P based functionality than ever. The network is poised to -grow, so now is a good time to remind everyone to be smart and be safe -when obtaining I2P and I2P-related software. We welcome new -applications, implementations, and forks with new ideas, and the power -of the network comes from its openness to participation by all I2P -users. In fact, we don’t like to call you users, we like to use the word -“Participants” because each of you helps the network, in your own way by -contributing content, developing applications, or simply routing traffic -and helping other participants find peers. +It is an an exciting time for The Invisible Internet Project (I2P). +We are completing our migration to modern cryptography across all of our transports, ( Java and C++), and we have recently gained a high-capacity and professional outproxy service, and there are more applications integrating I2P based functionality than ever. +The network is poised to grow, so now is a good time to remind everyone to be smart and be safe when obtaining I2P and I2P-related software. +We welcome new applications, implementations, and forks with new ideas, and the power of the network comes from its openness to participation by all I2P users. +In fact, we don’t like to call you users, we like to use the word “Participants” because each of you helps the network, in your own way by contributing content, developing applications, or simply routing traffic and helping other participants find peers. {%- endtrans %} {% trans -%} @@ -35,32 +27,20 @@ You are the network, and we want you to be safe. {%- endtrans %} {% trans -%} -We have become aware of attempts to impersonate I2P’s presence on the -web and social media. To avoid offering momentum to these campaigns, we -will not mention the actors affiliated with them, However, in order to -help you recognize these campaigns should you encounter them in the -wild, we are documenting their tactics: +We have become aware of attempts to impersonate I2P’s presence on the web and social media. +To avoid offering momentum to these campaigns, we will not mention the actors affiliated with them, However, in order to help you recognize these campaigns should you encounter them in the wild, we are documenting their tactics: {%- endtrans %} -- Copying text directly from the I2P Web Site without acknowledging our - licence requirements in a way that may suggest endorsement. -- Involvement or promotion of an Intial Coin Offering, or ICO +- Copying text directly from the I2P Web Site without acknowledging our license requirements in a way that may suggest endorsement. +- Involvement or promotion of an Initial Coin Offering, or ICO - Crypto-Scam like language - Graphics that have nothing to do with the textual content -- Click-farming behavior, sites that appear to have content but which - instead link to other sites -- Attempts to get the user to register for non-I2P chat servers. We - come to you or you come to us, we will not ask you to meet us at a - third-party service unless you already use it(Note that this is not - always true for other forks and projects, but it is true of - geti2p.net). -- The use of bot networks to amplify any message on social media. - I2P(geti2p.net) does not use bots for social media advertising. +- Click-farming behavior, sites that appear to have content but which instead link to other sites +- Attempts to get the user to register for non-I2P chat servers. We come to you or you come to us, we will not ask you to meet us at a third-party service unless you already use it(Note that this is not always true for other forks and projects, but it is true of geti2p.net). +- The use of bot networks to amplify any message on social media. I2P(geti2p.net) does not use bots for social media advertising. {% trans -%} -These campaigns have had the side-effect of “shadow-banning” some -legitimate I2P-related discussion on Twitter and possibly other social -media. +These campaigns have had the side-effect of “shadow-banning” some legitimate I2P-related discussion on Twitter and possibly other social media. {%- endtrans %} {% trans -%}Our Sites{%- endtrans %} @@ -70,19 +50,17 @@ media. We have official sites where people may obtain the I2P software safely: {%- endtrans %} -- `Official Website - i2p.net - TLS Fingerprint(SHA256) - +- `{% trans -%}Official Website - i2p.net - TLS Fingerprint(SHA256){%- endtrans %} - 5B:09:29:D9:26:64:7D:0E:33:B6:4A:9D:6F:58:FA:5E:24:EF:18:81:21:A9:A9:4F:8B:D2:CE:D8:74:91:60:8B `__ -- `Official Website - geti2p.net - TLS Fingerprint(SHA256) - +- `{% trans -%}Official Website - geti2p.net - TLS Fingerprint(SHA256){%- endtrans %} - 5B:09:29:D9:26:64:7D:0E:33:B6:4A:9D:6F:58:FA:5E:24:EF:18:81:21:A9:A9:4F:8B:D2:CE:D8:74:91:60:8B `__ -- `Official Gitlab - i2pgit.org - TLS Fingerprint(SHA256) - +- `{% trans -%}Official Gitlab - i2pgit.org - TLS Fingerprint(SHA256){%- endtrans %} - D5:E4:E0:88:B2:21:69:F2:A1:6F:AB:FF:97:08:8C:65:5C:2C:27:2A:B1:CB:E7:49:A4:54:10:52:81:B4:4D:B1 `__ -- `Official Debian Repository - deb.i2p2.de - TLS - Fingerprint(SHA256) - +- `{% trans -%}Official Debian Repository - deb.i2p2.de - TLS Fingerprint(SHA256){%- endtrans %} - 17:42:0B:AB:B6:4F:24:51:5E:BC:AD:10:44:9E:2C:C9:37:BB:28:89:74:62:6B:0A:9F:23:4C:5E:A5:EA:64:91 `__ -- `Official Debian Repository - deb.i2p2.no - TLS - Fingerprint(SHA256) - +- `{% trans -%}Official Debian Repository - deb.i2p2.no - TLS Fingerprint(SHA256){%- endtrans %} - EC:43:E8:DC:29:8E:BB:78:B9:88:70:ED:21:1A:8E:AD:FA:8D:6F:5E:D9:56:54:89:9F:7B:30:58:1E:03:02:CE `__ -- `Official Forums - i2pforum.net - TLS Fingerprint(SHA256) - +- `{% trans -%}Official Forums - i2pforum.net - TLS Fingerprint(SHA256){%- endtrans %} - 7B:1E:B6:5D:C7:5A:DE:32:E6:08:DB:8E:3C:4C:DB:5F:67:DB:13:A3:C8:1F:F9:26:53:C9:49:94:8E:CD:90:D1 `__ {% trans -%}Invisible Internet Project Forums, Blogs and Social Media{%- endtrans %} @@ -91,46 +69,33 @@ We have official sites where people may obtain the I2P software safely: {% trans -%}Hosted by the project{%- endtrans %} ~~~~~~~~~~~~~~~~~~~~~ -- `I2P Forums `__ and it’s `I2P +- `{% trans -%}I2P Forums{%- endtrans %} `__ - `{% trans -%}I2P{%- endtrans %} Mirror `__ -- irc: `#i2p-dev` on Irc2P(`127.0.0.1:6668` in a standard I2P - installation) +- irc: `#i2p-dev` on Irc2P(`127.0.0.1:6668` in a standard I2P installation) {% trans -%}Hosted by Others{%- endtrans %} ~~~~~~~~~~~~~~~~ {% trans -%} -These services are hosted by third-parties, sometimes corporations, -where we participate in order to provide a social media outreach -presence to I2P users who choose to participate in them. We will never -ask you to participate in these unless you already have an account with -them, prior to interacting with us. +These services are hosted by third-parties, sometimes corporations, where we participate in order to provide a social media outreach presence to I2P users who choose to participate in them. +We will never ask you to participate in these unless you already have an account with them, prior to interacting with us. {%- endtrans %} -- `Launchpad : https://launchpad.net/i2p `__ -- `Github : https://github.com/i2p `__ -- `Twitter : https://twitter.com/GetI2P `__ -- `Reddit : +- `{% trans -%}Launchpad{%- endtrans %} : https://launchpad.net/i2p `__ +- `{% trans -%}Github{%- endtrans %} : https://github.com/i2p `__ +- `{% trans -%}Twitter{%- endtrans %} : https://twitter.com/GetI2P `__ +- `{% trans -%}Reddit{%- endtrans %} : https://www.reddit.com/r/i2p/ `__ -- `Mastodon: +- `{% trans -%}Mastodon{%- endtrans %}: https://mastodon.social/@i2p `__ -- `Medium: https://i2p.medium.com/ `__ +- `{% trans -%}Medium{%- endtrans %}: https://i2p.medium.com/ `__ {% trans -%}Forks, Apps, and Third-Party Implementations are Not Evil.{%- endtrans %} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ {% trans -%} -This post attempts to provide ways of vetting the source for obtaining -the Java I2P package represented by the source code contained in -https://i2pgit.org/i2p-hackers/i2p.i2p and -https://github.com/i2p/i2p.i2p, and which is available for download from -the web site https://geti2p.net/en/download. It is not intended to pass -judgement on third-party forks, downstream projects, embedders, -packagers, people experimenting in laboratories, or people who just -disagree with us. You are all valued members of our community who are -trying to protect, and not compromise, the privacy of others. Since we -are aware of attempts to impersonate I2P project community members, you -may wish to review the download, verification, and installation -procedures which you recommend to your users in order to document your -official sources and known mirrors. +This post attempts to provide ways of vetting the source for obtaining the Java I2P package represented by the source code contained in https://i2pgit.org/i2p-hackers/i2p.i2p and https://github.com/i2p/i2p.i2p, and which is available for download from the web site https://geti2p.net/. +It is not intended to pass judgement on third-party forks, downstream projects, embedders, packagers, people experimenting in laboratories, or people who just disagree with us. +You are all valued members of our community who are trying to protect, and not compromise, the privacy of others. +Since we are aware of attempts to impersonate I2P project community members, you may wish to review the download, verification, and installation procedures which you recommend to your users in order to document your official sources and known mirrors. {%- endtrans %}