Gotta show how to do this
Login to reply
Replies (4)
1. Go to SimpleX app --> Settings --> Networks and servers --> Your servers --> Add server --> Enter server manually --> Paste the SMP and XFTP servers one at a time to add them
2. Go to SimpleX app --> Settings --> SOCKS proxy settings --> Set SOCKS proxy to 127.0.0.1:4447 (or what port your I2P SOCKS proxy is)
Don't forget to give your I2P SOCKS proxy an outproxy before doing all of this! You can use Tor's SOCKS proxy 127.0.0.1:9050 as an outproxy.
Theres something you need to comprehend there is no such thing as 100% privacy. It's impossible for servers to not know an ip address connected to it that's how the internet works. Tor is not anonymous it's a private routing which your exposed to the user running the tor exit node. You will always be exposed to someone tor, vpn, isp, & i2p.
As for the storage of geolocation & device creating link yeah it sucks that's the one thing that sucks about it. What people fail to realize in this
"To prevent server overloading or attacks, the servers can temporarily store data that can link to particular users or devices, including IP addresses, geographic location, or information related to the transport sessions. This information is not stored for the absolute majority of the app users, even for those who use the servers very actively."
A third party operator can have this on so as quick as people are to find alternative smp servers to switch to just remember your putting blind trust into a random joe blow running a smp, xftp, & relay server over a corporation who is expressing their values just because it's not them what is joe blow expressing hey here's my .onion smp, xftp, & relay join because it's not simplex's servers lel.
Just fair warning host your own don't join alternatives they could turn on all that logging & store it you wouldn't know.
Oh mean I didn't consider using the Tor proxy as an outproxy that's huge, i2p may have just become my new obfuscation stack for SimpleX.
Privacy or anonymity! Choose one!