Ever wonder what's on Freenet? If you're curious, there's a public FProxy webGUI at [1]http://gel2bzjxrvcmqpji.onion:8888. It's part of a darknet on the Tor OnionCat IPv6 overlay network. The other 20 peers are listed here: [2]http://zerobinqmdqd236y.onion/?ceffbd4a36f954e0#UTW52y4tvML8B0Wwu9i3 Wl2BhbGruntf6k1f0kScz+Y=. It runs in a Debain 8.11 Docker container, which is hosted in a Debain 9.6.0 KVM domain, and that in turn is hosted on a Ubuntu 18.10 KVM VPS. Iptables rules at VPS and KVM domain levels block all Internet access except through Tor and OnionCat. I'll check it periodically. If someone has broken it, I'll restart the Docker container. If someone has managed to break the KVM domain, I'll restore that from backup. And if someone has gone the extra mile to break the VPS, I'll restore that from backup. This may seem bizarre to privacy lovers. I mean, I could be logging everything! But the point is providing easy-to-use access to Freenet that's secured from third parties. If you decide that it's worth the hassle, I recommend running your own node, connecting through OnionCat IPv6 peers. Or through I2P GarlicCat peers, if you like. While I could be logging everything, that's arguably more-or-less irrelevant, because Tor renders you and the node mutually anonymous. Not perfectly anonymous, true. But there's arguably little risk, unless you and/or the node have been targeted. Just be prudent. Especially be prudent about downloading files from the node. I recommend using Whonix, on a machine with full-disk encryption. Or Tails, with encrypted USB storage. References 1. http://gel2bzjxrvcmqpji.onion:8888/ 2. http://zerobinqmdqd236y.onion/?ceffbd4a36f954e0#UTW52y4tvML8B0Wwu9i3Wl2BhbGruntf6k1f0kScz+Y=