💾 Archived View for station.martinrue.com › gyaradong › 2452e5ed5e9f4b34a48edd4f80c0fb84 captured on 2024-06-16 at 13:29:43. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2024-05-12)

➡️ Next capture (2024-07-09)

🚧 View Differences

-=-=-=-=-=-=-

👽 gyaradong

Something I noticed: despite being its own little corner, gemini is still the internet, and the only way to be anonymous on gemini is through other people hosting services that one can connect to anonymously. Self hosting means identifying through DNS. However, despite being somewhat invisible, the law still applies to those hosting these platforms. That means the anonymity is conditional. Proper anonymity requires p2p data transfers.

11 months ago · 👍 akrabu, galacteek

Actions

👋 Join Station

7 Replies

👽 gyaradong

Apparently that's not what yggdrasil is for. It is more a mesh routing service rather than an overlay network. I think my point here was that nuances in the law matter regardless of the technology being used. The only way around it is to switch from a publish model to a messaging model. · 7 months ago

👽 byte

You can also make the capsule accessible through the yggdrasil network i guess, that would somewhat add to the anonymity · 7 months ago

👽 gyaradong

nice answers. yeah I didn't really think of Tor (it is arguably p2p). Can you do gemini over socks? I guess it makes sense. I think all p2p significantly complicates the protocol. You can't do it in a c64 (though I guess TLS is probably not possible either). · 11 months ago

👽 slondr

Gemini over GNUNET when,., · 11 months ago

👽 totroptof

P2P isn’t sufficient for anonymity. If you’re talking about hosting, this is what Tor onion services and I2P eepsites are for. I’m actually (very slowly) working on a glog about this with a protocol proposal 🙂

Although, it’s worth mentioning that neither onion services nor eepsites are quite as anonymous as one would like. The (now deprecated, but still extant) Tor Rendezvous Protocol v2 is all sorts of broken, and v3 can still be deanonymised by malicious directories.¹ Using I2P means registering as a router in a global directory, which may be a risk in many places.

[1] https://cypherpunks.ca/~iang/pubs/piros-acns22.pdf · 11 months ago

https://cypherpunks.ca/~iang/pubs/piros-acns22.pdf

👽 tm85

Gemini over i2p? · 11 months ago

👽 gyaradong

whether that's desirable is a separate thing entirely. · 11 months ago