• 发表时间: 2022-09-26
  • 文章作者: idk
  • 发表于 general

对于隐形互联网项目(I2P)来说,这是一个令人兴奋的时刻。 我们正在完成向现代加密技术的迁移,包括我们所有的传输协议(Java和C++),我们最近获得了高容量的专业出口代理服务,而且有更多的应用程序整合了基于I2P的功能。 网络正蓄势待发,所以现在是提醒大家在获取I2P和I2P相关软件时要明智和安全的好时机。 我们欢迎新的应用、实现和有新想法的分支,网络的力量来自于它对所有I2P用户的开放参与。 事实上,我们不喜欢称你们为用户,我们喜欢用"参与者"这个词,因为你们每个人都以自己的方式帮助网络,贡献内容,开发应用,或者仅仅是路由流量,帮助其他参与者找到彼此。

你们就是网络,我们希望你们安全。

我们已经意识到有人试图在网络和社交媒体上冒充I2P的存在。 为了避免给这些活动提供动力,我们不会提及与这些活动有关的诈骗者,但是,为了帮助您在上网遇到这些活动时识别它们,我们将记录它们的策略:

  • Copying text directly from the I2P Web Site without acknowledging our license requirements in a way that may suggest endorsement.
  • Involvement or promotion of an Initial Coin Offering, or ICO
  • Crypto-Scam like language
  • Graphics that have nothing to do with the textual content
  • Click-farming behavior, sites that appear to have content but which instead link to other sites
  • Attempts to get the user to register for non-I2P chat servers. We come to you or you come to us, we will not ask you to meet us at a third-party service unless you already use it(Note that this is not always true for other forks and projects, but it is true of geti2p.net).
  • The use of bot networks to amplify any message on social media. I2P(geti2p.net) does not use bots for social media advertising.

这些活动的副作用是连带禁止了Twitter和其他社交媒体上一些合法的I2P相关讨论。

我们的网站

System Message: WARNING/2 (Blog, line 35)

Title underline too short.

我们的网站
---------

我们的官方网站可以安全地获得I2P软件:

隐形互联网项目官方论坛、博客和社交媒体

由我们主办

由他人主办

这些服务由第三方托管,有些是公司,有些我们参与其中,是为了向选择参与的I2P用户提供社交媒体上的宣传。 除非您在与我们互动之前已经拥有一个账户,否则我们绝不会要求您参与这些服务。

分支、应用程序和第三方实现并不邪恶。

This post attempts to provide ways of vetting the source for obtaining the Java I2P package represented by the source code contained in https://i2pgit.org/I2P_Developers/i2p.i2p and https://github.com/i2p/i2p.i2p, and which is available for download from the web site https://geti2p.net/. It is not intended to pass judgement on third-party forks, downstream projects, embedders, packagers, people experimenting in laboratories, or people who just disagree with us. You are all valued members of our community who are trying to protect, and not compromise, the privacy of others. Since we are aware of attempts to impersonate I2P project community members, you may wish to review the download, verification, and installation procedures which you recommend to your users in order to document your official sources and known mirrors.

作者注:这篇博文的早期版本包含了I2P项目所运营的各项服务的TLS指纹。 当证书更新导致指纹不准确时,这些指纹已被删除。