Recent Posts
Categories
Status of Tor, I2P and FreeNet install and usage
Status of Tor, I2P and FreeNet install and usage
This entry is an update to the ongoing Qubes OS testing as a usable operating platform. For this I tested the installing of Tor, I2P and Freenet in a Qube and in a standalone VM. I must admit I had better sucess then I expected on all of them. I will first describe my configuration for the test, the Qube and the Standalone VM. Yes, I am running two installs, but only use one for my day to day testing. The day to day testing is the Qube or as the document state an APPVM. The Standalone VM is Ubuntu 12.04, patched up to 14.04 at this time. I am finding a few stability issues with the Standalone VM if I patch up to 16.04 and 18.04. Most of them are graphic problems that most likely are with Xen. The standalone VM is mostly for verify testing that what I have on the AppVM should be working.
The AppVM is a clone of the Debian 9 installed templet that I called SecureMachine. I like to use cloned templets for testing, so I always have a source of clean base templet. Also, backups are easy to run before I do any tinkering with apps on the templet. The following is the sections and what status is for them:
Tor:
- Tor was the easiest of all to install. I did not need to modify the SecureMachine’s templet at all. I just started the AppVM, opened the Firefox browser. and pulled down the Tor bundle from the Tor site. Ran the install and Wala, installed into the private section of my home directory. It is true that I could just use the Whonix AppVM, (which I do most of the time), But it was for a test anyway. I need to run it from a command line currently, other than that it starts the Tor circuit, then Tor browser as required. So am happy with the outcome. I will still be using the Whonix Qube for my primary Tor access. I also set up a Tor hidden service on a StandaloneVM running Ubuntu server. that was least as well. I needed to add the Tor source location into the package list. did an APT install of Tor, modified the Torrc entry for hidden service and rebooted the StandAlone VM to bring the service up. I also set up a connection to one of my normal Personal AppVM to the Ubuntu Standalone VM so it can be reached by that AppVM.
I2P
- The I2P install was a bit more of an issue, I needed to install it first in the templet then again in the AppVM. The reason for this is it needed helper apps first, things like cryptolibs and other special libs. This will depend on your patch lever and apps installed. Then I did a reinstall in the AppVM and it installed in the private directory with no issues. Running I2P needed to be started from the terminal command line, after changing to the i2p directory. It stared the browser, but I needed to modify a setting in the browsers network to use the proper port. Your setup may vary if you need to or not do this. It runs stable and seems to be quick. The peering and gathering of connections have been quick. I was able to install plugins and even set up a page for access by others. I am using the default install settings at the moment, later I may modify a few to see if any speed or operation changes occur.
Freenet
- Freenet was not too bad. I could not use the browser-based install, so I need to do the command line steps. Before that I needed to install java into the Secure_Machine templet. Then install the freenet program into the private home directory section of the AppVM. This as well needed to be down at the command line, so needed to start the terminal. It went well, now to start I need to open a terminal and run the freenet program with java. It runs and opens the browser, it runs quite quickly and stable. As mentioned before I first installed freenet into the StandAlone Ubuntu Desktop VM, using the same general steps as the AppVM for testing. Here as well I am using the AppVM most of the time now.
There is other Dark Web type application I may try later. But for now, I will keep testing with the big three, Tor, I2P, and Freenet.
Have a safe, secure, and anonymous internet exploring in all you do.
Recent Comments