iI  made some adjustments  to my daily  driver  setup  today.
iFirst off, I came across  this hidden service website  about
iopenbsd configuration, which strongly influenced my setup.
i
ihttp://oqptm57xf2g6mziwphlf7eqmkdg3ni6qneuuf3wbqzhdfcjufhumaxyd.onion
i
iThe idea is to proxy  all network  traffic  other  than time
isyncronization   and unbound through onion  routing.   Onion
irouting is a socks5 proxy strategy that to first order makes
iit impossible for conventional passive (or active) spying to
iwork by The Tor Project.  It seems it was originally ex a US
inavy research project.
i
iThis is significant  for gopher,  though perhaps less sdf in
ithat I have heard  of the bitreich  gopher onion initiative,
iwhich I have not investigated yet!
i
i[bitreich]
i
iI  have encountered  and investigated  lots of shocking  and
ideeply   evil  applications  of spying,  at first  not  very
iintentionally.   I guess lots of tech people have.   It is a
ipervasive,  severe and silent modern crisis. I mean to imply
ithat  it is healthy  for everyone  to not let themselves  be
iarbitrarily spied on.
i
iA positive  facet is that through keeping yourself  safe, it
iis much less stressful  to self-host  in a safe context than
iin a cut-throat spy movie context.
i
iTo the topic at hand, I made my usual openbsd  router also a
iproxy  for both tor and i2pd in the usual  way / roughly  as
idescribed by that web onion link.
i
iThough that website does not like having helper products  to
iforce  applications   through   a  socks5  proxy,  I   found
iproxychains4  on openbsd  the most convenient  and I believe
iacceptable  way of putting  lynx through a socks5 proxy, for
iexample.
i
iRe:lynx  I cut firefox derivatives  out of my diet entirely.
iThe question is, what to do with rich multimedia. My pattern
iso far is like follows:
i
i##        Like       screen       but       less        aged
itmux
i##      tmux     top/bottom      split     screen      terms
iC-b "
i##  Lynx   in  the top ;  to the i2p common   site   listing
iproxychains4 lynx -anonymous identiguy.i2p
i## Get the url of the highlighted  rich media in lynx (after
i*, maybe)
i=
i##        Go        to        the        other         frame
iC-b o
i## use a mouse to sweep out and paste a rich media link into
iproxychains4 lynx -anonymous <paste> -dump > <new local file
iname.ext>  ## tmux can do copy/paste  with emacs conventions
iitself too.
i
iAnd so we reach what I actually thought to post about. Which
iis using ssh through tor socks5 without using anything  like
iproxychains4.    In this case,  you tell ssh to use  openbsd
inetcat to deal with the socks5 proxying. If you will forgive
ime wrapping the command in ecl's ext:system  (just system(3)
ifrom C - pass a command to the calling shell).
i
i(ext:system
i"ssh -o ProxyCommand='nc -X5 -xa.b.c.1:port  %h %p' [email protected]")
i
iWhere  the  last 'abc's, 'port'   are whatever   numbers   are
iappropriate  for you, and 'me' would be your sdf username  :
iIn this case, being routed through tor.
i
iTyping is noticeably laggy. All up I am basically happy with
ieverything though.
i
iOh!  Reseeding  i2pd.   If you already  have an i2pd router;
ianyway, check i2pd.conf. It has a place for you to direct it
ito seed from an earlier i2pd router.
i
iNext  time, I will do some ecl/C sdl2 stuff.  I have seen  a
icouple of people using it suspiciously similarly to me. When
iI was browsing  a web scheme-bbs  on i2p, I came across  the
iverisimilitudes  gopherite  talking about how horrible ecl's
isffi #'c-progn  is, which I have been using.  Ha ha ha.  For
ianother day.
i