P2P networks list

– Tor

I think this is the most popular p2p network today.
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor can be used to run hidden services with .onion domain.

Site: www.torproject.org

– Freenet (File sharing)

Freenet is a peer-to-peer platform for censorship-resistant communication and publishing. It has no direct routing, sites are stored as files with routing key.

Site: freenetproject.org

– I2P

I2P is an anonymous overlay network like Tor. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

I2P can be used to run hidden services with .i2p domain.

– ZeroNet

Much like Freenet, but uses bitcoin cryptography. Sites are served by visitors.

Has .bit top-level domain.

Site: zeronet.io

– Freifunk/ChaosVPN/DN42

This is a group of VPNs and mesh networks.

Main IP ranges: 10.4.0.0/16, 10.32.0.0/16, 10.100.0.0/14, 10.104.0.0/14, 172.31.0.0/16

– Alienet

Alienet is a vpn based hidden network, close (you can’t use it like a proxy, nor any proxy will be able to enter it). It bears around concepts related to anonymity, privacy and security.
In Alienet you’ll be able to visit the ‘.anon’ sites: it looks like a parallel network, out of all, indipendent, uncensored and among all secure.

– Neptilla

Neptilla is small p2p network designed by the group of mind-like individuals to exchange and store knowledge. Now seems to be down.

Beyond that, there are many smaller p2p networks which are not listed anywhere and requires an invite.

DN42 network setup

Hi all!

This my first post. I will tell you about DN42 network and how to connect to it.

dn42

About dn42

dn42 is a big dynamic VPN, which employs Internet technologies (BGP, whois database, DNS, etc). Participants connect to each other using network tunnels (GRE, OpenVPN, Tinc, IPsec) and exchange routes thanks to the Border Gateway Protocol. Network addresses are assigned in the 172.20.0.0/14 range and private AS numbers are used (see registry) as well as IPv6 addresses from the ULA-Range (fd00::/8)

Getting started

In this tutorial I will explain how to connect DN42 from any Ubuntu-like Linux distro.

Make sure you have OpenVPN installed. If no, run sudo apt-get install openvpn in your terminal.

Register a maintainer object

  1. Go to io.nixnodes.net and click ‘Create object’ button
  2. Choose ‘mntner’ object
  3. Enter <YOUR-NAME>-MNT in ‘mntner’ field
  4. Enter your password  in ‘sha512-pw’ field
  5. Use DUMMY-DN42 as admin-c and tech-c (Can be updated later)
  6. Enter <YOUR-NAME>-MNT in ‘mnt-by’
  7. Press ‘Save’ and wait 10-15 minutes for repository update

Get your first peer!

Use ssh <YOUR-NAME>-MNT@ix.aperture-laboratories.science to connect to ASIX.

It will prompt for your password.

Now enter ‘openvpn’ and ‘create’ commands in ASIX shell. Wait until new session ID will be created.

Then type ‘get <SESSION-ID>’ and save openvpn config to local file ASIX.ovpn.

Move to ASIX main page by typing ‘back’ command.

Then type ‘servers’ command to see the list of available servers.

Edit ASIX.ovpn file, it is well-commented.

Connect

In your linux terminal type ‘sudo openvpn –config ASIX.ovpn’ and wait until it will output ‘Initialization Sequence Completed’. Congrats! You have DN42 connected.

DNS setup

In order to access .dn42 sites your need to properly configure your DNS settings.

Add ‘nameserver 172.23.0.53’ to the beginning of your /etc/resolv.conf file.

Also you can find more details about DNS config at dn42.net/services/DNS

DN42 sites

You can start browsing DN42 network at http://wiki.dn42. It is much like Tor hidden wiki.

I will explain DN42 and BGP more clearly in later posts.

NOTE: Don’t go looking for .lll / .rdos sites here, they are not online anymore!