Ever wonder what's on Freenet? If you're curious, there's a public FProxy
webGUI at http://gel2bzjxrvcmqpji.onion:8888
<http://gel2bzjxrvcmqpji.onion:8888/>. It's part of a darknet on the Tor
OnionCat IPv6 overlay network. The other 20 peers are listed here:
http://zerobinqmdqd236y.onion/?ceffbd4a36f954e0#UTW52y4tvML8B0Wwu9i3Wl2BhbGruntf6k1f0kScz+Y=
<http://zerobinqmdqd236y.onion/?ceffbd4a36f954e0#UTW52y4tvML8B0Wwu9i3Wl2BhbGruntf6k1f0kScz+Y=>.
It runs in a Debain 8.11 Docker container, which is hosted in a Debain 9.6.0
KVM domain, and that in turn is hosted on a Ubuntu 18.10 KVM VPS. Iptables
rules at VPS and KVM domain levels block all Internet access except through Tor
and OnionCat.I'll check it periodically. If someone has broken it, I'll restart
the Docker container. If someone has managed to break the KVM domain, I'll
restore that from backup. And if someone has gone the extra mile to break the
VPS, I'll restore that from backup.
This may seem bizarre to privacy lovers. I mean, I could be logging everything!
But the point is providing easy-to-use access to Freenet that's secured from
third parties. If you decide that it's worth the hassle, I recommend running
your own node, connecting through OnionCat IPv6 peers. Or through I2P GarlicCat
peers, if you like.
While I could be logging everything, that's arguably more-or-less irrelevant,
because Tor renders you and the node mutually anonymous. Not perfectly
anonymous, true. But there's arguably little risk, unless you and/or the node
have been targeted. Just be prudent. Especially be prudent about downloading
files from the node. I recommend using Whonix, on a machine with full-disk
encryption. Or Tails, with encrypted USB storage.