<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>I2P Services | A Curated Guide to I2P</title> <meta name="description" content="I2P is for more than just drug markets. This is a list of services I2P has to offer."> <meta name="keywords" content="i2p, hidden services, darknet, deep web, tor, privacy"> <meta name="twitter:card" content="summary"> <meta name="twitter:site" content="@The_Tin_Hat"> <meta name="twitter:title" content="I2P Services | A Curated Guide to I2P"> <meta name="twitter:description" content="I2P is for more than just drug markets. This is a list of services I2P has to offer."> <meta name="twitter:creator" content="@The_Tin_Hat"> <meta name="twitter:image" content="https://thetinhat.com/blog/assets/i2p-guide-hacker.jpg"> <meta name="twitter:image:width" content="1080"> <meta name="twitter:image:height" content="600"> <meta property="og:title" content="I2P Services | A Curated Guide to I2P"> <meta property="og:description" content="I2P is for more than just drug markets. This is a list of services I2P has to offer."> <meta property="og:type" content="article"/> <meta property="og:site_name" content="The Tin Hat"/> <meta property="og:url" content="https://thetinhat.com/blog/else/i2p-services-guide.html"/> <meta property="og:image" content="https://thetinhat.com/blog/assets/i2p-guide-hacker.jpg"> <meta property="og:image:type" content="image/png"> <meta property="og:image:width" content="1080"> <meta property="og:image:height" content="600"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="stylesheet" href="/css/normalize.css"> <link rel="stylesheet" href="/css/skeleton.css"> <link rel="stylesheet" href="/css/style.css"> <link rel="icon" type="image/png" href="/images/favicon.ico"> <script type="text/javascript"> var _paq = _paq || []; _paq.push(["setDomains", ["*.thetinhat.com","*.qza32xuddl3guikc.onion","*.secure.thetinhat.i2p","*.thetinhat.i2p"]]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="/analytics/"; _paq.push(['setTrackerUrl', u+'piwik.php']); _paq.push(['setSiteId', 1]); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.type='text/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s); })(); </script> </head> <body> <div class="u-full-width header"> <div class="row"> <ul class="header-nav"> <a href="/index.html"><li id="header-nav-home"><img id="header-nav-logo" src="/images/logo.jpg"></li></a> <ul id="header-nav-items"> <a href="/tutorials/all.html"><li class="menu">Tutorials</a> <ul> <a href="/tutorials/all.html"><li>All</li></a> <a href="/tutorials/addons/addons.html"><li>Add-ons</li></a> <a href="/tutorials/alternatives/alternatives.html"><li>Alternatives</li></a> <a href="/tutorials/darknets/darknets.html"><li>Darknets</li></a> <a href="/tutorials/messaging/messaging.html"><li>Messaging</li></a> <a href="/tutorials/misc/misc.html"><li>Other</li></a> </ul></li> <a href="/blog/index.html"><li>Articles</li></a> <a href="/about/about.html"><li>About</li></a> </ul> </ul> </div> </div> <div class="header-spacer"></div> <article class="container" itemscope itemtype="https://schema.org/TechArticle"> <div class="author" itemprop="publisher">The Tin Hat</div> <div class="twelve columns"> <img itemprop="image" src="/blog/assets/i2p-guide-hacker.jpg" alt="I2P Services | A Curated Guide to I2P" class="u-full-width"/> <div class="writing" itemprop="text"> <h1 itemprop="headline" id="headline">I2P Services | A Curated Guide to I2P</h1> <span style="text-transform: capitalize;">Category: else</span><br> <span>A 3 Minute Read</span><br> <p itemprop="datePublished">31 Jan 2015</p> <p>Image By<a href="https://www.flickr.com/photos/daniel-rehn/"> Daniel Rehn</a></p> <hr> <a target="_blank" href="https://thetinhat.com/nordvpn"><img src="/images/nord1.png" width="100%"></a><br><br> <p>Lately, several articles have been published about I2P largely due to the Silk Road moving from Tor. Some of these articles have done a good job in covering I2P, others not so much.</p> <p>It seems that one of the hurdles that authors are having trouble with is understanding the idea that there is more to I2P than simply a drug market. Thus, here’s a list of various I2P services that aren’t drug markets, that may still be of interest. Many of the services have clear-net alternatives, the advantage being that on I2P your activities are anonymous and secure.</p> <p>Each link is a b32 address, meaning that you shouldn’t need an address book lookup, and should be able to go directly to the site.</p> <p>Also, some content on these websites is under copyright, and thus downloading it may be illegal in your area. I don’t publicly endorse piracy, and thus download them at your own discretion. I’m merely trying to convey the techno-geographical landscape of I2P for educational purposes. (i.e. don’t Barret Brown me).</p> <h3 id="file-sharing">File Sharing</h3> <p><a href="http://ahsplxkbhemefwvvml7qovzl5a2b5xo5i7lyai7ntdunvcyfdtna.b32.i2p/">Tracker2.postman.i2p</a></p> <ul> <li>This is one of the top sites on I2P. It features thousands of torrents which can be loaded up onto your <a href="http://127.0.0.1:7657/i2psnark/">torrent client</a> for secure, anonymous file-sharing.</li> </ul> <p><a href="http://bvpy6xf6ivyws6mshhqmdmr36pruh2hvoceznzeag52mpu647nzq.b32.i2p/">Ebooks.i2p</a></p> <ul> <li>This has a fairly good library of ebooks that can be searched and downloaded. As of writing this there are 30898 books waiting to be downloaded.</li> </ul> <p><a href="http://qktkxwawgixrm5lzofnj5n24zspbnzxy4pvjm7uvaxvmgwrsuvgq.b32.i2p/">Tome.i2p</a></p> <ul> <li>Another ebook library which is currently being reorganized, yet still has hundreds, if not thousands of ebooks.</li> </ul> <h3 id="communication">Communication</h3> <p><a href="http://wwgtflbaa7od2fxbw4u7q7uugmdclxf56alddvizugwcz5edjgia.b32.i2p/plugins/i2pbote/">I2P-Bote</a></p> <ul> <li>This is a secure, distributed messaging platform similar to email, but superior in many ways. For more information <a href="/tutorials/messaging/i2pbote.html">read my tutorial</a>.</li> </ul> <p><a href="http://127.0.0.1:7657/susimail/susimail">Email</a></p> <ul> <li>This is a much more typical email service that comes default on your I2P router. It also allows emails to be sent to the clear-net.</li> </ul> <p>IRC</p> <ul> <li>There’s no link for this one because you’ll need to use an IRC client. But I2P is home to some great discussions, and there’s some information on <a href="http://127.0.0.1:7657/console">the I2P router console</a> on how to set it up.</li> </ul> <h3 id="hosting">Hosting</h3> <p><a href="http://127.0.0.1:7658">Personal Website</a></p> <ul> <li>With I2P comes a built-in anonymous webserver. Here you can build your own website and host it for free, allowing anyone else on I2P access to it.</li> </ul> <p><a href="http://erkqiwnjl7vtysqd3wvddv6tfvnhswarqkbn4blhdlhfxn7cf2ha.b32.i2p/">Pastebin</a></p> <ul> <li>There’s not a lot to say on this one, except that it’s a simple pastebin which you can use anonymously.</li> </ul> <p><a href="http://ufuqdzsxltiz224vq5gnuslt3a3t72dhy5kq6i2xway53m6pzv6q.b32.i2p/">Id3nt.i2p</a></p> <ul> <li>I2P’s Twitter. It’s a microblogging platform which currently has over 1100 users.</li> </ul> <p><a href="http://vsd2vtgtuua2vwqsal2mpmxm2b2cpn3qzmqjoeumrrw2p4aot7uq.b32.i2p/">Git hosting</a></p> <ul> <li>Anonymous Git hosting for sharing source code.</li> </ul> <h3 id="forums">Forums</h3> <p><a href="http://ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p/">Zzz.i2p</a></p> <ul> <li>A forum for discussion of I2P development. Tends to be fairly active as far as darknet forums go.</li> </ul> <p><a href="http://33pebl3dijgihcdxxuxm27m3m4rgldi5didiqmjqjtg4q6fla6ya.b32.i2p/">Forum.i2p</a></p> <ul> <li>A more general discussion forum. This is a good place to go for general discussion, technical help, as well as development of I2P and related services.</li> </ul> <h3 id="how-towikis">How-To/Wikis:</h3> <p><a href="http://z3f3owc72awbywk4p6qb5l2mxgitvs6ejztggbpn2a3ddmymfjda.b32.i2p/">Ugha.i2p</a></p> <ul> <li>A wiki with how-to guides on a variety of topics. A good place for both new and experienced users.</li> </ul> <p><a href="http://aululz24ugumppq56jsaw3d7mkbmcgo7dl2lgeanvpniyk2cbrda.b32.i2p/">Killyourtv.i2p</a></p> <ul> <li>This site has both tutorials, as well as a list of services which it provides. There’s everything here from how-to’s to Python documentation.</li> </ul> <p><a href="http://ecduxoion5uc5hnvzjxff6iiwhdwph6gse3dknyvlo7e6gaeho7a.b32.i2p/">Irongeeks.i2p</a></p> <ul> <li>Notes from Tor and I2P workshops, hosted by Adrian Crenshaw. There’s quite a bit of information here on installing and tweaking various aspects of both I2P and Tor.</li> </ul> <p><a href="http://qnfdfjfrcycygz5p7drylkv6pde7b5ehxemefjt63blqtal4cpaa.b32.i2p/">Privacyhawk.i2p</a></p> <ul> <li>More step-by-step tutorials. This includes some good guide on installing hardened Gentoo, configuring Thunderbird to access your I2P mail, signature verification in Windows, etc. It’s not pretty, but it’s quite useful.</li> </ul> <p><a href="http://4q3qyzgz3ub5npbmt3vqqege5lg4zy62rhbgage4lpvnujwfpala.b32.i2p/">Secure.thetinhat.i2p</a></p> <ul> <li>Easily the best site on I2P (kidding of course). This is the I2P mirror of what you’re reading now. Includes tutorials and regular blog posts.</li> </ul> <h3 id="miscellaneous">Miscellaneous</h3> <p><a href="http://oane7gi73374frhll27wxqxgtfxkzeuxvseghnlwgs7cnflrz22a.b32.i2p/">Eepcast.i2p</a></p> <ul> <li>If there was ever a right time to use the phrase Pirate Radio, this would be it. Underground 24/7 radio station streaming right to your PC through I2P.</li> </ul> <p><a href="http://mwfpkdmjur5ytq4og36ym3ychinv36b2a57f4rmgqmtrwepq3fva.b32.i2p/">Keys.echelon.i2p</a></p> <ul> <li>A PGP key server where you can upload and download PGP keys. Not a lot to say here other than that its a good choice for anyone hoping to distribute their keys anonymously.</li> </ul> <p><a href="http://y45f23mb2apgywmftrjmfg35oynzfwjed7rxs2mh76pbdeh4fatq.b32.i2p/">Planet.i2p</a></p> <ul> <li>A feed aggregator for posts made on various I2P websites (except this one). Its a good place to discover content and keep up to date with the I2P community.</li> </ul> <p><a href="http://wwgtflbaa7od2fxbw4u7q7uugmdclxf56alddvizugwcz5edjgia.b32.i2p/plugins/tahoe/">Tahoe-Lafs</a></p> <ul> <li>This is a distributed, cryptographically secure file store that operates over the I2P network. Tahoe-LAFS is fairly complex, so I’d recommend you read <a href="https://www.tahoe-lafs.org/trac/tahoe-lafs">their documentation</a>, but know that most of the I2P community is a fan. The I2P version won’t be great for large files, but is perfect for small ones.</li> </ul> <p><strong>Have more suggestions? Leave a comment down below.</strong></p> <aside> <p>Want to upgrade your online privacy? I use <a href="https://thetinhat.com/nordvpn" target="_blank">NordVPN</a> to encrypt my traffic and route it across the globe, and <a target="_blank" href="https://spideroak.com/the-tin-hat/">Spideroak</a> for rock solid encrypted cloud storage!</p> <div class="box"> <div class="subbox"> <a target="_blank" href="https://thetinhat.com/nordvpn"><img src="/images/nordvpn.png"/></a> <a target="_blank" href="https://spideroak.com/the-tin-hat/"><img src="/images/spideroak-code.png"/></a> </div> </div> </aside> </div> </div> </div> </article> <div class="container"> <div class="row"> <div class="twelve columns row-header"><h1>Share, Follow, & Comment</h1></div> </div> <div class="row writing"> <div class="box"> <div class="subbox half"> <a target="_blank" href="http://twitter.com/share?url=https://thetinhat.com/blog/else/i2p-services-guide.html&text=I2P Services | A Curated Guide to I2P via @The_Tin_Hat:" style="background-color: #55acee;" class="soctag socicon-twitter"></a> <a target="_blank" href="http://www.facebook.com/sharer/sharer.php?u=https://thetinhat.com/blog/else/i2p-services-guide.html" style="background-color: #3b5998;" class="soctag socicon-facebook"></a> <a target="_blank" href="http://reddit.com/submit?url=https://thetinhat.com/blog/else/i2p-services-guide.html&title=I2P Services | A Curated Guide to I2P" style="background-color: #ff5700;" class="soctag socicon-reddit"></a> </div> <div class="subbox half"> <a target="_blank" href="whatsapp://send?text=https://thetinhat.com/blog/else/i2p-services-guide.html" style="background-color: #25D366;" class="soctag socicon-whatsapp"></a> <a target="_blank" href="/rss.xml" style="background-color: #ff6600;" class="soctag socicon-rss"></a> <a href="mailto:?subject=Check Out This Article&body=I2P Services | A Curated Guide to I2P: https://thetinhat.com/blog/else/i2p-services-guide.html" style="background-color: #303030;" class="soctag socicon-mail"></a> </div> <div class="subbox half"> <a target="_blank" href="https://twitter.com/The_Tin_Hat" style="background-color: #55acee;" class="follow">Follow On Twitter</a> </div> <div class="subbox half"> <a target="_blank" href="https://www.facebook.com/thetinhatprivacy/" style="background-color: #3b5998;" class="follow">Follow On Facebook</a> </div> </div> <div class="comments"> <script data-isso="/isso" src="/isso/js/embed.min.js"></script> <section id="isso-thread"></section> </div> </div> </div> </div> <aside class="container"> <div class="row"> <div class="twelve columns row-header"><h1>Latest Posts</h1></div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/is-bitcoin-private.html"><img itemprop="image" src="/blog/assets/bitcoin-privacy-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/is-bitcoin-private.html"><h2 itemprop="headline">Is Bitcoin Actually Private?</h2></a> <p style="display: none;" itemprop="datePublished">23 Jul 2017</p> <p itemprop="description">A primer on privacy and Bitcoin, why it matters for fungibility, and what cryptocurrencies are trying to fix it.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/slantwise-resistance.html"><img itemprop="image" src="/blog/assets/slantwise-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/slantwise-resistance.html"><h2 itemprop="headline">Slantwise Action | How WhatsApp, Signal, and Steemit Are Feeding the Resistance</h2></a> <p style="display: none;" itemprop="datePublished">14 Jul 2017</p> <p itemprop="description">Can people meaningfully resist surveillance without knowing it?</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/internet-of-health.html"><img itemprop="image" src="/blog/assets/internet-of-health-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/internet-of-health.html"><h2 itemprop="headline">The Internet of Things Isn't Just About Networked Juicers | Privacy, Health, & Technology</h2></a> <p style="display: none;" itemprop="datePublished">26 May 2017</p> <p itemprop="description">The privacy failings of the internet of things get worse when we realize its inevitable health applications</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/but-the-data-says-so.html"><img itemprop="image" src="/blog/assets/but-the-data-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/but-the-data-says-so.html"><h2 itemprop="headline">But The Data Says So | Why Data Can't Exist in a Social Vacuum</h2></a> <p style="display: none;" itemprop="datePublished">19 May 2017</p> <p itemprop="description">Some people still don't grasp that data can't be removed from society (and it's racist tendencies)</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/cloud/tahoe-lafs-nodes-part-3.html"><img itemprop="image" src="/tutorials/images/tahoe-lafs-part-3-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/cloud/tahoe-lafs-nodes-part-3.html"><h2 itemprop="headline">Tahoe-LAFS Tutorial (Part 3) | Running a Storage Node on I2P</h2></a> <p style="display: none;" itemprop="datePublished">12 May 2017</p> <p itemprop="description">Learn how to contribute to Tahoe-LAFS on I2P by running your own storage node!</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/what-is-ransomware.html"><img itemprop="image" src="/blog/assets/what-is-ransomware-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/what-is-ransomware.html"><h2 itemprop="headline">What is Ransomware and How Do I Protect Against It?</h2></a> <p style="display: none;" itemprop="datePublished">05 May 2017</p> <p itemprop="description">Learn how ransomware is shutting down entire institutions, and how you can defend against it</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/how-secure-email.html"><img itemprop="image" src="/blog/assets/how-secure-email-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/how-secure-email.html"><h2 itemprop="headline">How Secure Is Email?</h2></a> <p style="display: none;" itemprop="datePublished">05 May 2017</p> <p itemprop="description">A primer on email security. Learn where email is weak and how to make it stronger.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/cloud/tahoe-lafs-part-2.html"><img itemprop="image" src="/tutorials/images/tahoe-lafs-2-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/cloud/tahoe-lafs-part-2.html"><h2 itemprop="headline">Tahoe-LAFS Tutorial (Part 2) | Running Tahoe-LAFS on I2P</h2></a> <p style="display: none;" itemprop="datePublished">22 Apr 2017</p> <p itemprop="description">Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial shows you how to run Tahoe-LAFS using I2P on Linux</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/cloud/tahoe-lafs-part-1.html"><img itemprop="image" src="/tutorials/images/tahoe-lafs-1-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/cloud/tahoe-lafs-part-1.html"><h2 itemprop="headline">Tahoe-LAFS Tutorial (Part 1) | Decentralized Cloud Storage</h2></a> <p style="display: none;" itemprop="datePublished">07 Apr 2017</p> <p itemprop="description">Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial is the first in a three part series that teaches you the basics of Tahoe-LAFS</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/how-start-anonymous-blog.html"><img itemprop="image" src="/blog/assets/anonymous-blog-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/how-start-anonymous-blog.html"><h2 itemprop="headline">How Do I Start An Anonymous Blog?</h2></a> <p style="display: none;" itemprop="datePublished">31 Mar 2017</p> <p itemprop="description">If you want to start an anonymous blog, there's a lot of considerations. This primer will point you to the tools and tips you need to get started.</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/vpn-threat-model-america.html"><img itemprop="image" src="/blog/assets/vpn-threat-model-america-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/vpn-threat-model-america.html"><h2 itemprop="headline">Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils</h2></a> <p style="display: none;" itemprop="datePublished">23 Mar 2017</p> <p itemprop="description">American ISPs are now selling your data, and despite controversy, a VPN isn't necessarily a bad idea.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/brave-browser.html"><img itemprop="image" src="/blog/assets/brave-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/brave-browser.html"><h2 itemprop="headline">4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin)</h2></a> <p style="display: none;" itemprop="datePublished">17 Mar 2017</p> <p itemprop="description">Brave is disrupting the entire online advertising model for the better. Learn what it can do for you.</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/is-tor-safe.html"><img itemprop="image" src="/blog/assets/is-tor-safe-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/is-tor-safe.html"><h2 itemprop="headline">Is Tor Safe? | Assessing 5 Claims About Tor’s Security</h2></a> <p style="display: none;" itemprop="datePublished">09 Mar 2017</p> <p itemprop="description">Is Tor funded by the US government? Can it be hacked? Can it be broken by mere statistics? This article unpacks those claims.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/darknets/zeronet.html"><img itemprop="image" src="/tutorials/images/zeronet-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/darknets/zeronet.html"><h2 itemprop="headline">ZeroNet | Introduction & Setup Tutorial</h2></a> <p style="display: none;" itemprop="datePublished">03 Mar 2017</p> <p itemprop="description">Discover how ZeroNet could revolutionize Tor and I2P's hidden services, before learning how to install it yourself</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/location-privacy.html"><img itemprop="image" src="/blog/assets/location-privacy-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/location-privacy.html"><h2 itemprop="headline">Why Location Privacy Matters</h2></a> <p style="display: none;" itemprop="datePublished">24 Feb 2017</p> <p itemprop="description">Location data says a lot about us, with or without Stingrays at work. We need to take it more seriously.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/what-is-device-fingerprinting.html"><img itemprop="image" src="/blog/assets/browserfingerprinting.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/what-is-device-fingerprinting.html"><h2 itemprop="headline">What is Device Fingerprinting?</h2></a> <p style="display: none;" itemprop="datePublished">17 Feb 2017</p> <p itemprop="description">Learn what browser fingerprinting is and how it canb e used to track you online.</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/darknets/torrent-anonymously-i2p-vpn-free.html"><img itemprop="image" src="/tutorials/images/torrent-privately-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/darknets/torrent-anonymously-i2p-vpn-free.html"><h2 itemprop="headline">How To Actually Torrent Privately & Anonymously For Free</h2></a> <p style="display: none;" itemprop="datePublished">09 Feb 2017</p> <p itemprop="description">Learn the pros and cons of using a VPN to torrent, as well as how to use I2P to anonymously torrent for free!</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/misc/linux-vpn-drop-protection-firewall.html"><img itemprop="image" src="/tutorials/images/vpn-drop-2-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/misc/linux-vpn-drop-protection-firewall.html"><h2 itemprop="headline">The Best VPN Kill Switch For Linux Using Easy Firewall Rules</h2></a> <p style="display: none;" itemprop="datePublished">03 Feb 2017</p> <p itemprop="description">Learn how to protect against your VPN disconnecting using these simple Linux firewall rules</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/else/ledger-nano-s-review-bitcoin.html"><img itemprop="image" src="/blog/assets/ledger-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/else/ledger-nano-s-review-bitcoin.html"><h2 itemprop="headline">Ledger Nano S Review | Why You Need a Bitcoin Hardware Wallet</h2></a> <p style="display: none;" itemprop="datePublished">25 Jan 2017</p> <p itemprop="description">A review of the Ledger Nano S, and an explanation of why hardware wallets just make life better when using Bitcoin</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/what-is-two-factor-authentication-2fa-u2f.html"><img itemprop="image" src="/blog/assets/what-is-2fa.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/what-is-two-factor-authentication-2fa-u2f.html"><h2 itemprop="headline">What is Two Factor Authentication (2FA) And Why Use It?</h2></a> <p style="display: none;" itemprop="datePublished">20 Jan 2017</p> <p itemprop="description">What 2FA is, why you should use it, and why we need FIDO U2F.</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/else/support-on-patreon.html"><img itemprop="image" src="/blog/assets/patreon-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/else/support-on-patreon.html"><h2 itemprop="headline">Support The Tin Hat on Patreon!</h2></a> <p style="display: none;" itemprop="datePublished">17 Jan 2017</p> <p itemprop="description">The Tin Hat now has a few more ways to support the site.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/primers/what-is-a-hash.html"><img itemprop="image" src="/blog/assets/whatisahash.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/primers/what-is-a-hash.html"><h2 itemprop="headline">What is a hash?</h2></a> <p style="display: none;" itemprop="datePublished">15 Jan 2017</p> <p itemprop="description">A simple explanation of what hashing is, and how hashes are used.</p> </div> </div> <div class="row"> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/blog/thoughts/trumps-toolbox-future-attribute-screening-technology.html"><img itemprop="image" src="/blog/assets/trump-fast-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/blog/thoughts/trumps-toolbox-future-attribute-screening-technology.html"><h2 itemprop="headline">Trump's Toolbox | Future Attribute Screening Technology</h2></a> <p style="display: none;" itemprop="datePublished">15 Nov 2016</p> <p itemprop="description">FAST is a program that attempts to wirelessly detect whether youre a terrorist, and its in Trump's back pocket.</p> </div> <div class="one-half column preview" itemscope itemtype="https://schema.org/TechArticle"> <a href="/tutorials/addons/ublock-origin-best-adblocker-alternative.html"><img itemprop="image" src="/tutorials/images/ublock-origin-thumb.jpg-sml" class="u-max-full-width"/></a> <a href="/tutorials/addons/ublock-origin-best-adblocker-alternative.html"><h2 itemprop="headline">uBlock Origin | The Best AdBlock Alternative</h2></a> <p style="display: none;" itemprop="datePublished">20 Feb 2016</p> <p itemprop="description">For AdBlock (Plus) alternatives, look no further than uBlock Origin. This tutorial explains why, and how, you should use it.</p> </div> </div> <br> </aside> <div class="u-full-width footer"> <div class="row"> <ul id="footer-nav-left"> <a href="/about/about.html#contact"><li>Contact</li></a> <a href="/about/about.html#privacy-policy"><li>Privacy Policy</li></a> <a href="/rss.xml"><li>RSS Feed</li></a> </ul> <ul id="footer-nav-right"> <a href="/about/about.html#support"><li>Support Me</li></a> <li>Hidden Services:</li> <a href="http://tinhat233xymse34.onion"><li>Tor</li></a> <a href="http://secure.thetinhat.i2p"><li>I2P</li></a> </ul> </div> </div> <noscript><p><img src="/analytics/piwik.php?idsite=1" style="border:0;" alt=""/></p></noscript> </body> </html>