[Wiki] Anonymization Networks

To maintain anonymity while hacking or hosting content, you can use these networks and programs. They are all libre software.

I2P is a garlic routing network, meaning similarly to Tor it routes all traffic through a few nodes and encrypts the traffic. Unlike Tor its a closed network and traffic cannot easily escape the network, at least not without an out-proxy. Unlike Tor you can use I2P for torrenting and a few things more. Compared to Tor there is more personal websites and file hosts/torrenting and less illegal content.

How to use the network:
On Windows there is a browser to use for I2P: I2P Easy Install Bundle (Beta) for Windows - I2P
On Unix start the i2p daemon and point your browser (or torrent, email or whatever program) to localhost on port 4444.

How to setup a site on I2P:

# install program for server
apt install i2pd

cat << EOF > tunnels.conf
type = http
host =
port = 8080
keys = example.dat

#output the address
cat example.dat

Primary Links
I2P Main website: https://geti2p.net/en/
Alternative client written in C++: https://i2pd.website/
Alternative client, enhanced: https://i2pplus.github.io/
Duckduckgo: http://gqt2klvr6r2hpdfxzt4bn2awwehsnc7l5w22fj3enbauxkhnzcoq.b32.i2p/
InfoCon Archives: http://ic7rentjh6ilzz6p5kveiuyzov534ksfcexmpeniyallzf5in67a.b32.i2p/
OpenBSD: http://ahwlj76krc5do77pibighi2frqmfccpezyiqfmiernvivwomgvuq.b32.i2p/
Privatebin: http://e7qy5kc7ivqtnrbdn5ymx5nmbdedlrjkdchqmmkhud4ockrime5a.b32.i2p/


Yggdrasil is an overlay network with strong encryption. It’s much smaller than I2P and by worlds smaller than Tor, but still worth looking into. Mostly IRCs and Forums are hosted there. It relies on IPv6 exclusively.

How to use it (on Ubuntu/Debian GNU+Linux):

#update package manage and install dirmngr
apt update
apt install dirmngr 

#fetch keys
gpg --fetch-keys https://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/key.txt`
gpg --export 569130E8CA20FBC4CB3FDE555898470A764B32C9 | sudo apt-key add -`

#add repository
echo 'deb http://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/ debian yggdrasil' | sudo tee /etc/apt/sources.list.d/yggdrasil.list`

#update the package manager and install yggdrasil
apt update; apt install yggdrasil 

#generate the config
yggdrasil -genconf -json > /etc/yggdrasil.conf

#add peers to the config
#look here for peers: https://github.com/yggdrasil-network/public-peers
#use as near as possible nodes geographically
cat << EOF > /etc/yggdrasil.conf
  #your peers here

How to host something on Yggdrasil:
Setup the network like above and continue with adding more peers. Then restart Yggdrasil with Systemctl (on systemD distros)

systemctl restart yggdrasil

Primary Links:
Main website: https://yggdrasil-network.github.io/
Public Peers: https://github.com/yggdrasil-network/public-peers
Yggdrasil Sites:
PrivateBin: http://[321:c99a:91a1:cd2c::3]/
Yggdrasil Community: http://[21a:34aa:c782:3ad2:1bf8:73f8:141:66e8]/
Yggdrasil Network: http://[319:3cf0:dd1d:47b9:20c:29ff:fe2c:39be]/

Tor is the largest network of those all. All traffic gets routed through three nodes and is encrypted. Tor is mostly secure if you take some means of securing your client. Content hosted on Tor is called a hidden service. For hackers Tor is in particular in interest, because you can anonymize your hacking activities with it when attacking.

Setting up Tor to use as client

#update package manager
apt update
#install tor
apt install tor

#enable and start the daemon
systemctl enable --now tor

Now just point your client to localhost on port 9050 and you are using Tor.

Setting up Tor as a transparent proxy with iptables on GNU/Linux
Sometimes it makes sense to root all traffic on a system through Tor. For example in a VM you use for hacking or on a webserver hosting a hidden service.

#add transparent tor proxy port to config file
cat << EOF >> /etc/tor/torrc
AutomapHostsOnResolve 1

#make all traffic resolve through localhost
echo "nameserver" > /etc/resolve.conf
echo "nohook resolv.conf" > /etc/dhcpcd.conf
#route all traffic through tor with iptables
iptables -t nat -A OUTPUT -p TCP -m owner ! --uid-owner tor -j DNAT --to-destination
iptables -t nat -A OUTPUT -p TCP --dport 53 -j DNAT --to-destination`
iptables -t nat -A OUTPUT -p UDP --dport 53 -j DNAT --to-destination`

Setting up a hidden service on Tor:
Tor hidden services are sites on the Tor network which can be accessed exclusively over Tor

#add this to the config
cat << EOF >> /etc/tor/torrc
HiddenServiceDir /var/lib/tor/HIDDENSERVICENAME/
HiddenServicePort PORT`

#restart Tor to take effect
systemctl restart tor@default

#get the .onion address of the service
cat /var/lib/tor/hidden_service/HIDDENSERVICENAME`

Primary Links
Tor Project: https://www.torproject.org/
Kicksecure VMs that route all traffic through Tor: https://www.whonix.org/
Hidden Services:
Tor Project Support: http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/
Tor Project Status: http://eixoaclv7qvnmu5rolbdwba65xpdiditdoyp6edsre3fitad777jr3ad.onion/
Bridges for Tor: http://yq5jjvr7drkjrelzhut7kgclfuro65jjlivyzfmxiq2kyv5lickrl4qd.onion/
Tor Metrics: http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/
Duckduckgo: https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/
Ahmia: http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/

Recticulum is NOT a single network. It is a tool to build a bunch of anonymous networks. One example of such network is NomadNet

How to use rns

#install nomadnet
pip3 install nomadnet

#run the client

Primary Links
Recticulum Main Page: https://reticulum.network/

Regard and happy hacking,


good post keep it up