ubui2pdesktopkleinminti2pdesktopklein

i2plogo

The internet is being taken over by Big Tech and governments.
Dark web? No, the Invisible Internet Project (I2P) is a fully encrypted private network layer. Made by people for people.
Pre-installed on your new Ubuntushop.eu  computer

The network is people powered . Peers make a portion of their resources, particularly bandwidth, available to other network participants. This allows the network to function without relying on centralized servers.

What is I2P?

The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected. In some cases people rely on the network when they need to be discrete or are doing sensitive work.

I2P Cares About Privacy

I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.


The Invisible Internet Project (I2P): No one can see where traffic is coming from, where it is going, or what the contents are.
The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.

I2P has created transport protocols that resist DPI censorship, and continuously improves its end to end encryption.

After starting I2P:

For permanent use of I2P install the Firefox I2P addon.

Or configure your favorite browser for I2P.

 

The Invisible Internet Project began in 2002. The vision for the project, as described in an interview with Lance James was for the I2P Network "to deliver full anonymity, privacy, and security at the highest level possible. Decentralized and peer to peer Internet means no more worrying about your ISP controlling your traffic. This will allow (people) to do seamless activities and change the way we look at security and even the Internet, utilizing public key cryptography, IP steganography, and message authentication. The Internet that should have been, will be soon." Since then I2P has evolved to specify and implement a complete suite of network protocols capable of delivering a high level of privacy, security, and authentication to a variety of applications.

The I2P network

The I2P network is a fully encrypted peer-to-peer overlay network. An observer cannot see a message's contents, source, or destination. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P transports offer resistance to recognition and blocking by censors. Because the network relies on peers to route traffic, location-based blocking is a challenge that grows with the network. Every router in the network participates in making the network anonymous. Except in cases where it would be unsafe, everyone participates in sending and receiving network traffic.

How to Connect to the I2P Network

The core software (Java) includes a router that introduces and maintains a connection with the network. It also provides applications and configuration options to personalize your experience and workflow.

What Can I Do On The I2P Network?

The network provides an application layer for services, applications, and network managment. The network also has its own unique DNS that allows self hosting and mirroring of content from the Internet (Clearnet). The I2P network functions the same way the Internet does. The Java software includes a BitTorrent client, and email as well as a static website template. Other applications can easily be added to your router console.

An Overview of the Network

I2P uses cryptography to achieve a variety of properties for the tunnels it builds and the communications it transports. I2P tunnels use transports, NTCP2 and SSU2, to conceal the traffic being transported over it. Connections are encrypted from router-to-router, and from client-to-client(end-to-end). Forward-secrecy is provided for all connections. Because I2P is cryptographically addressed, I2P network addresses are self-authenticating and only belong to the user who generated them.

The network is made up of peers ("routers") and unidirectional inbound and outbound virtual tunnels. Routers communicate with each other using protocols built on existing transport mechanisms (TCP, UDP), passing messages. Client applications have their own cryptographic identifier ("Destination") which enables it to send and receive messages. These clients can connect to any router and authorize the temporary allocation ("lease") of some tunnels that will be used for sending and receiving messages through the network. I2P has its own internal network database (using a modification of the Kademlia DHT) for distributing routing and contact information securely.

About Decentralization and the I2P Network

The I2P network is almost completely decentralized, with exception to what are called Reseed Servers. This is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. Basically, there is not a good and reliable way to get out of running at least one permanent bootstrap node that non-network participants can find to get started. Once connected to the network, a router only discovers peers by building "exploratory" tunnels, but to make the initial connection, a reseed host is required to create connections and onboard a new router to the network. Reseed servers can observe when a new router has downloaded a reseed from them, but nothing else about traffic on the I2P network.

Dimensions (w x d x h)
396.9mm x 262mm x 25mm
Weight
2.41Kg
Colour
Grey/Black
Chipset
Processor Support
13th Generation Intel Processor Support
Memory
Memory Type
Supports DDR4 3200MHz
Number of Modules
2 x Modules
Maximum Supported Memory
64GB
Hard Drive Capacity
M.2 Port
1 x M.2 PCIe 4.0 Port, 1 x M.2 PCIe Port
Display & Graphics
Graphics
Choice of graphics cards - refer to configurator.
Screen Size
17.3 inch Widescreen
Native/Maximum Resolution
2560 x 1440
Refresh Rate
Please refer to configurator.
NTSC
Please refer to configurator.
Graphics TDP (Thermal Design Power)
RTX 2050: 55W, RTX 3050: 75W, RTX 4050 75W (Dynamic Boost 25W), RTX 4070|4060 115W (Dynamic Boost 25W)
Audio
Chipset
Sound Blaster ™ Studio
Channels
2 channel HD Audio
Connections
1 x 2-in-1 Audio Jack, 1 x Microphone Jack
Speakers
Built in two speakers
Integrated Microphone
Yes, Array Microphone
Communications
LAN
Gigabit LAN
Wireless Support
Wireless LAN 802.11ax/ac/b/g/n (M.2 Interface)
Bluetooth Support
Bluetooth V5.2 module support
Keyboard & Mouse
Keys
Multi colour backlit isolated keyboard
Language Support
Multi-Language support
Pointing Device | Touchpad Mouse
Built in touch pad with multi-gesture and scrolling function
Backlit Keyboard
Yes
Memory Card Reader
Memory Card Reader
1 x Micro SD Card Slot
Ports
LAN
1 x RJ-45 jack
USB
2 x USB 3.2 Gen 2 Ports (Type C), 1 x USB 3.2 Gen 1 Port, 1 x USB 2.0 Port
Display
1 x HDMI, 1 x Mini DP 1.4
Microphone-IN
1
Headphone-OUT
1 x 2 in 1 Combi Jack (Microphone jack will be disabled when in use)
DC-in
1
Webcam
Webcam
2.0MP FHD Webcam
Battery & Power Lead
Battery Capacity
4 Cell Lithium-Ion 54WH
Typical Battery Life
Up to 4 Hours
Battery Type
Integrated
Power Lead & AC Adpater
1 x Power Lead included with AC Adapter
Security
Kensington Lock
Yes

Configure your linux-mint computer.

Choose your language and hit next.

oemminten1

Choose your keyboard layout You can also detect keyboard layout.

oemminten2

Choose your region:

oemminten3

Choose a name, name of your computer, username(cannot start with capital letter), password, automatic login or login with password. Then press continue.

The computer is being set up. Enjoy.

oemminten4

duonp50
Dimensions & Weight
Dimensions (w x d x h)
359.5mm x 238mm x 22.7mm
Weight
1.99KG
Colour
Grey/Black
Chipset
Processor Support
13th Generation Intel Processor Support
Memory
Memory Type
Supports DDR4 3200MHz
Number of Modules
2 x Modules
Maximum Supported Memory
64GB
Hard Drive Capacity
M.2 Port
1 x M.2 PCIe 4.0 Port, 1 x M.2 PCIe Port
Display & Graphics
Graphics
Choice of graphics cards - refer to configurator.
Screen Size
15.6 inch Widescreen
Native/Maximum Resolution
1920 x 1080
Refresh Rate
144 Hz
NTSC
72%
Graphics TDP (Thermal Design Power)
RTX 2050: 55W, RTX 3050: 75W
Audio
Chipset
High Definition Audio + SOUND BLASTER™ cinema 6
Channels
2 channel HD Audio
Connections
1 x 2-in-1 Audio Jack, 1 x Microphone Jack
Speakers
Built in two speakers
Integrated Microphone
Yes, Array Microphone
Communications
LAN
Gigabit LAN
Wireless Support
Wireless LAN 802.11ax/ac/b/g/n (M.2 Interface)
Bluetooth Support
Bluetooth V5.2 module support
Keyboard & Mouse
Keys
Multi colour backlit isolated keyboard
Language Support
Multi-Language support
Pointing Device | Touchpad Mouse
Built in touch pad with multi-gesture and scrolling function
Backlit Keyboard
Yes
Memory Card Reader
Memory Card Reader
1 x Micro SD Card Slot
Ports
LAN
1 x RJ-45 jack
USB
2 x USB 3.2 Gen 2 Ports (Type C), 1 x USB 3.2 Gen 1 Port, 1 x USB 2.0 Port
Display
1 x HDMI, 1 x Mini DP 1.4
Microphone-IN
1
Headphone-OUT
1 x 2 in 1 Combi Jack (Microphone jack will be disabled when in use)
DC-in
1
Webcam
Webcam
2.0MP FHD Webcam
Battery & Power Lead
Battery Capacity
4 Cell Lithium-Ion 54WH
Typical Battery Life
Up to 4 Hours
Battery Type
Integrated
Power Lead & AC Adpater
1 x Power Lead included with AC Adapter
Security
Kensington Lock
Yes

How to restore your linux with the Restore Usb stick.

Put your usb stick in the computer, start the computer and hit the F7 button several times until you see:

redobios

Choose with arrow key down on your keyboard  the usb entry and hit enter.

arrowdown

After that you should have the usb grub menu. Choose redorescue entry with arrow key down and hit enter:

redogrub

Wait until program loads, and hit the restore button:

restorebegin1

Now choose an entry with usb and ext4 in it:

 redochoosusb

So you have this, then hit next:

redousbkeuzenext

Next hit the select button to select the backup:

redoselect

A filemanager will open to select the backup,for mint this will be mintbackup or for ubuntu, ubuntubackup, or mintback or ububack. The name could be different. But it should be the file with .redo extention.

Select the file and hit ok .

redoselectbak

So you will have this. Then hit next.

redoselctiobakup

Now select your harrdisk in the computer. In most cases this will be a nvme disk, but could also be sata disk. But you need the select the line with the old linux (mint or ubuntu) in it.

Do not select the line with usb in it.

redodestkeuze

You will have this. Hit next:

reduekeuzefinaal

Next you will restore options, leave everything as it is, just hit next.

reduebeginnen

Hit yes i'm sure button:

reduzeker

Restore will begin.

redobezig

Hit ok when done:

redogedaan

Now exit the system. Hit the shutdown button.

restoreshutdown

When the computer is powered down, remove the usb and start your computer.

Currency
$ £
Copyright © 2019. Ubuntushop.be - linuxcomputers. LINUX-SERVICE.BE BVBA Grenadierslaan 65 B-9890 Gavere Belgium +32(0)93908078 BTW:BE0865907518
Close