idk 7f690f20d3 start pure-java solution
Former-commit-id: 418fa9a6a0
Former-commit-id: e0ea2e83ffa521fb28f22a54def8b5862c607302
2022-10-23 17:25:48 -04:00
2022-10-23 11:26:45 -04:00
2022-10-23 17:25:34 -04:00
2022-09-06 18:42:37 -04:00
2022-08-07 22:21:29 -04:00
2022-10-17 21:26:30 -04:00
2022-10-23 11:54:13 -04:00
2022-10-23 11:34:25 -04:00
2022-10-20 00:47:50 -04:00
2022-10-23 01:24:06 -04:00
2022-10-22 23:09:00 -04:00
2022-10-22 22:11:19 -04:00
2022-10-23 11:40:39 -04:00
2022-10-23 01:22:45 -04:00
2022-09-16 16:16:59 -04:00
2022-10-23 01:24:07 -04:00
2022-08-22 00:40:38 -04:00
2022-09-06 19:25:43 -04:00
2022-09-16 16:39:05 -04:00
2022-10-23 17:25:48 -04:00
2022-09-15 23:34:42 -04:00
2022-09-15 23:57:32 -04:00
2022-08-31 20:58:42 -04:00
2022-09-15 22:29:04 -04:00
2022-08-07 23:55:25 -04:00
2022-10-23 01:24:09 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:11 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:18 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-10-23 01:24:04 -04:00
2022-09-17 15:05:30 -04:00
2022-10-23 01:24:04 -04:00
2022-10-01 21:13:01 -04:00
2022-10-23 01:24:27 -04:00
2022-08-07 23:55:25 -04:00
2022-09-29 23:16:29 -04:00
2022-10-23 01:24:29 -04:00
2022-09-16 16:39:05 -04:00
2022-09-07 14:15:31 -04:00
2022-10-20 00:47:50 -04:00
2022-10-23 11:26:45 -04:00
2022-10-23 01:24:30 -04:00
2022-10-22 17:00:48 -04:00
2022-09-02 18:34:40 -04:00
2022-10-04 20:48:19 -04:00
2022-10-22 20:55:41 -04:00
2022-10-23 01:24:31 -04:00
2022-09-01 16:04:12 -04:00
2022-10-23 01:24:33 -04:00
2022-08-22 00:40:38 -04:00
2022-10-23 01:24:35 -04:00
2022-10-20 00:47:50 -04:00
2022-09-06 18:15:21 -04:00
2022-09-06 21:08:34 -04:00

i2p.plugins.firefox

A port of the batch scripts from i2p.firefox to Java.

Status: This package is maintained. It cannot solve all your problems. Fingerprinting is a reality in modern browsers. Exploits are too. This software attempts to provide a best-possible baseline of privacy first, security a close second for browsing the web that exists within I2P. Do not expect it to withstand attacks from very powerful adversaries who can spend time and money to screw up your life. Do expect it to resist advertisers, trackers, and jerks using off-the-shelf techniques and exploits. It is fundamentally unable to make changes which un-trust your browser vendor, your OS, your package manager or any other system that exists underneath it. It is just a profile manager.

All packages require a running I2P router.

Windows users should see the Easy-Install Bundle

Credits

This profile manager makes use of a set of browser extensions which are largely the work of others. It makes use of dependencies that are the work of others. In many ways, it's merely an elaborate configuration tool. A smart one, but a configuration tool nonetheless. Many thanks to the following projects, developers, and communities:

Firefox and Chrome Extensions

Firefox Configuration Modifiations

You can find the license files for each of the these projects in the src/i2p.firefox.*.profile/extensions/* directory for Firefox, and the src/i2p.chromium.*.profile/extensions/*.js/* directories for Chromium.

Getting started

Using a Binary


mkdir ~/tmp-i2pfirefox && cd ~/tmp-i2pfirefox
wget https://github.com/eyedeekay/i2p.plugins.firefox/releases/download/1.0.2/i2pfirefox.zip
unzip i2pfirefox.zip
./i2pfirefox.cmd

#or if you want to use a Chromium

./i2pchromium.cmd

Build Dependencies

You will need ant and java java and for building the jar. You will need jpackage for many of the potential build targets. I've been using Java 17 on Debian mostly, on Debian and Ubuntu, install the dependencies with:

sudo apt-get install openjdk-17* ant

Some of the targets use scripts written in Go to help generate resources. If you want to update the profiles, you will need them. To install Go on Debian and Ubuntu:

sudo apt-get install golang-go

Add $HOME/go/bin to your $PATH so ant can find Go applications.

export PATH=$PATH:$HOME/go/bin

Then use Go to download the applications you need and add them to $HOME/go/bin.

If you want to build the Chromium profiles you will need a Go application called crx3 which is used to interact with the Chrome app store to download and update extensions.

go install github.com/mediabuyerbot/go-crx3/crx3@latest

Another Go application, called amo-version, is used to fetch extensions from addons.mozilla.org. Like the Chrome profiles, generating the Firefox profiles requires this application. If you don't want to update the profiles, you don't need it.

go install github.com/eyedeekay/amo-version@latest

One last Go application, called dzip is used to generate zip files deterministically for redistribution.

go install github.com/delicb/dzip@latest

If you don't want to use it, you can work around it by creating a file called dzip in /usr/local/bin/dzip and adding the contents:

#! /usr/bin/env sh
zip -r $@

This will break deterministic builds, but for testing it will continue to work. More elaborate scripts or other deterministic zip utilities can be easily substituted in by placing them in the $PATH under the name dzip.

For Fedora, use Yum, for Arch use pacman or something else but make sure to tell everyone about it. Once you have that installed, when building, make sure to add $GOPATH/bin/ to your $PATH.

export PATH=$PATH:$HOME/go/bin

Will almost always work.

Building

This is not actually a plugin yet, but it will be soon. The important bit is the jar. To generate that, you can either generate the full plugin, which will not work but produces the jar as a by-product, or you can:


ant jar

To build just the jar. You'll know it worked if you can:


java -cp ./src/build/i2pfirefox.jar net.i2p.i2pfirefox.I2PFirefox

and a new Firefox instance comes up with a fresh profile, ready-to-use for I2P browsing.

The cooler thing you can do with it is add it to an I2P distribution and somewhere in it, add a UI element that triggers something along the lines of this:


// Firefox Example
if (i2pIsRunning()) {
    logger.warning("I2P is already running");
    System.out.println("I2PFirefox");
    I2PFirefox i2pFirefox = new I2PFirefox();
    i2pFirefox.launch();
}

// Chromium Example
if (i2pIsRunning()) {
    logger.warning("I2P is already running");
    System.out.println("I2PChromium");
    I2PChromium i2pChromium = new I2PChromium();
    i2pChromium.launch();
}

// Auto-Select Example, chooses Firefox first, then Chromium
if (i2pIsRunning()) {
    logger.warning("I2P is already running");
    System.out.println("I2PBrowser");
    I2PBrowser i2pBrowser = new I2PBrowser();
    /*
     * toggle chromium to the top of the order by doing:
    I2PBrowser.chromiumFirst = true;
     * 
    */
    i2pBrowser.launch(privateBrowsing);
}

to add a browser management tool to it.

Browser Discovery Methods

This tool looks for browsers on the host system, creates a workspace to use for I2P purposes, and launches the browser inside of that workspace. The details of the workspace vary from browser to browser but roughly corresponds to a browser profile. In order to be successful this tool uses 3 main types of browser discovery methods, in this order:

  1. "Local" discovery, where a browser is in a subdirectory of the directory where you ran the launcher. This will only happen if the user unpacked a portable browser into the same directory where they ran the launcher.
  2. "Path-Based" discovery, where it scans common browser installation directories until it finds one which it can use. On Unix, it simply scans the directories on the PATH for a browser it knows about. On Windows, default paths to browser install directories are hard-coded and included in the binary. This is what usually happens.
  3. "System-Based" discovery, where it defers to the host system to make a choice about the browser and counts on browser vendors to honor the system proxy environment variables. This is a catch-all solution which works with most browsers, but does not apply any customizations.

There is a little subtlety here though.

  • The path to Edgium on Windows will always resolve during path-based discovery, resulting in a positive test for Chromium when launching the browser in auto-select mode. So Windows will never reach stage 3 unless expressly forced to. If Firefox or a variant is installed, it will be chosen before Edgium unless directed otherwise.
  • Even though it will launch you into Edgium if it has no other choice, I recommend you do not use it. Edgium will in a constant, incessant way try to induce you to share your behavior with Microsoft. If you try to resist this, it negatively affects the performance of the browser. Google also does this with Chrome, ant this negatively affects Chrome performance too, but less than with Edgium. TL:DR Edgium sucks and is pointless and terrible. Literally any other browser would be better.
  • Linux is unaware of a Tor Browser path because Tor Browser is rarely, if ever, installed on-path. What is on path is virtually always a wrapper for Tor Browser which is installed either as the main user or it's own user. Linux will only use Tor Browser if it's discovered in "Local" mode. To set this up automatically, you can cd to the I2P directory where you unpacked the .tar.gz file, and run the ./lib/torbrowser.sh script from there.
  • I really only test Phase 3 with Dillo and Edgium. YMMV.

Usability vs Strict

This is basically a profile-management tool geared toward minimizing the differences between browser users which are passively discernible while they are browsing I2P. It assumes that they are part of a highly fragmented browsing environment where they are already unique, and therefore consolidation on configuration is a goal. However, this goal sometimes also conflicts with usability. To allow users a safe set of choices, we offer "Coarse" configuration in 2 modes. We recommend that you do not deviate from these configurations if you have browser application fingerprinting as a concern.

Usability Mode

TODO: description

Pros: Allows a restricted subset of Javascript Pros: Less likely to try and reach the clearnet

Cons: Looks very different from Tor Browser Cons: Plugin updates can create temporary uniqueness

Usability Extension Set
  • I2P In Private Browsing
  • uMatrix
  • jsRestrictor
  • LocalCDN
  • Onion in Container Tabs
  • HTTPS EveryWhere in some configurations
Usability user.js characteristics

TODO: Summarize differences

Strict Mode

TODO: description

Pros: Does not allow Javascript by default Pros: Looks a lot like Tor Browser especially if you're using Tor Browser

Cons: More work to use Cons: Temporary uniqueness can be created by enabling Javascript for specific sites Cons: More likely to try and reach the clearnet

Strict Extension Set
  • NoScript
  • I2P In Private Browsing
  • HTTPS EveryWhere in some configurations
Strict user.js characteristics

TODO: Summarize differences

Description
A port of the batch scripts from i2p.firefox to Java.
Readme 265 MiB
Languages
HTML 40.5%
Java 40.4%
Shell 11.6%
JavaScript 6%
CSS 1.3%