add some images

This commit is contained in:
idk
2020-10-07 09:49:37 -04:00
parent ef9fbe5e34
commit f0ddd7aebf
7 changed files with 112 additions and 3 deletions

View File

@ -15,15 +15,32 @@ torrent:
up: up:
cp idk.i2p.torrent ~/.i2p/i2psnark/idk.i2p.torrent cp idk.i2p.torrent ~/.i2p/i2psnark/idk.i2p.torrent
mv ./idk.i2p ~/.i2p/i2psnark/idk.i2p cp -rv ./idk.i2p ~/.i2p/i2psnark/idk.i2p
README: README:
cat yTop.md ySidebar.md zBlog.md | tee README.md cat yTop.md ySidebar.md zBlog.md | tee README.md
info:
@echo "<!DOCTYPE html>" > infographics.html
@echo "<html>" >> infographics.html
@echo "<head>" >> infographics.html
@echo " <title>idk's home page</title>" >> infographics.html
@echo " <link rel=\"stylesheet\" type=\"text/css\" href =\"style.css\" />" >> infographics.html
@echo " <meta http-equiv=\"i2p-location\" content=\"http://b2o47zwxqjbn7jj37yqkmvbmci7kqubwgxu3umqid7cexmc7xudq.b32.i2p\"/>" >> infographics.html
@echo " <meta http-equiv=\"i2p-torrentlocation\" content=\""`torrent2magnet idk.i2p.torrent`"\"/>" >> infographics.html
@echo "</head>" >> infographics.html
@echo "<body>" >> infographics.html
sed "s|magnetsub|[Magnet Link]($(magnet))|g" infographics.md | \
sed 's|https://github.com/eyedeekay/various-i2p-browsers/tree/master||g' | \
markdown | tee -a infographics.html
@echo " <script src=\"script.js\" type=\"text/javascript\"></script>" >> infographics.html
@echo "</body>" >> infographics.html
@echo "</html>" >> infographics.html
mag: mag:
@echo `torrent2magnet idk.i2p.torrent` @echo `torrent2magnet idk.i2p.torrent`
index: README index: README info
@echo "<!DOCTYPE html>" > index.html @echo "<!DOCTYPE html>" > index.html
@echo "<html>" >> index.html @echo "<html>" >> index.html
@echo "<head>" >> index.html @echo "<head>" >> index.html

View File

@ -24,6 +24,7 @@ are also I2P labs projects.
* [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/) * [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/)
This is an ongoing evaluation of the various ways there are to configure This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them. browsers for I2P and a developing rating system for them.
* [InfoGraphic Gallery for testing X-I2P-TorrentLocation](infographics.html)
### Go(golang) I2P Tools ### Go(golang) I2P Tools

Binary file not shown.

View File

@ -4,7 +4,7 @@
<title>idk's home page</title> <title>idk's home page</title>
<link rel="stylesheet" type="text/css" href ="style.css" /> <link rel="stylesheet" type="text/css" href ="style.css" />
<meta http-equiv="i2p-location" content="http://b2o47zwxqjbn7jj37yqkmvbmci7kqubwgxu3umqid7cexmc7xudq.b32.i2p"/> <meta http-equiv="i2p-location" content="http://b2o47zwxqjbn7jj37yqkmvbmci7kqubwgxu3umqid7cexmc7xudq.b32.i2p"/>
<meta http-equiv="i2p-torrentlocation" content=""/> <meta http-equiv="i2p-torrentlocation" content="magnet:?xt=urn:btih:e2bd16bf439595eb81c3b9624463e865ac657392"/>
</head> </head>
<body> <body>
<h1>idk's home page</h1> <h1>idk's home page</h1>
@ -32,6 +32,7 @@ use I2P with the maximum privacy available from Chromium.</li>
<li><a href="I2P-Browser-Attackability-Evaluation/">I2P Browser Fingerprint Gallery</a> <li><a href="I2P-Browser-Attackability-Evaluation/">I2P Browser Fingerprint Gallery</a>
This is an ongoing evaluation of the various ways there are to configure This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them.</li> browsers for I2P and a developing rating system for them.</li>
<li><a href="infographics.html">InfoGraphic Gallery for testing X-I2P-TorrentLocation</a></li>
</ul> </ul>
<h3>Go(golang) I2P Tools</h3> <h3>Go(golang) I2P Tools</h3>

51
infographics.html Normal file
View File

@ -0,0 +1,51 @@
<!DOCTYPE html>
<html>
<head>
<title>idk's home page</title>
<link rel="stylesheet" type="text/css" href ="style.css" />
<meta http-equiv="i2p-location" content="http://b2o47zwxqjbn7jj37yqkmvbmci7kqubwgxu3umqid7cexmc7xudq.b32.i2p"/>
<meta http-equiv="i2p-torrentlocation" content="magnet:?xt=urn:btih:e2bd16bf439595eb81c3b9624463e865ac657392"/>
</head>
<body>
<h1>Infographics Gallery</h1>
<p>These are various infographics I've found around Reddit, mostly,
and collected here. They are here in part as a way of testing
an approach to using Bittorrent-over-I2P as a peer-to-peer way
of backing the resources on the site.</p>
<ul>
<li><img src="images/attacks.jpg" alt="Types of Attacks" title="" /></li>
<li><img src="images/awareness.jpg" alt="Security Awareness" title="" /></li>
<li><img src="images/banknotes.jpg" alt="Bank Note Security" title="" /></li>
<li><img src="images/barricade.jpg" alt="Barricading a Door" title="" /></li>
<li><img src="images/burglars.png" alt="Burglar Defenses" title="" /></li>
<li><img src="images/cells.jpg" alt="Cell Phones" title="" /></li>
<li><img src="images/csec2.jpg" alt="Computer Security" title="" /></li>
<li><img src="images/csec.jpg" alt="Computer Security 2" title="" /></li>
<li><img src="images/etherpad.jpg" alt="Etherpad" title="" /></li>
<li><img src="images/knots.jpeg" alt="Knots" title="" /></li>
<li><img src="images/langs1.png" alt="Languages" title="" /></li>
<li><img src="images/langs2.png" alt="Languages 1" title="" /></li>
<li><img src="images/laptopsec.jpg" alt="Laptop Security" title="" /></li>
<li><img src="images/leadersec.jpg" alt="Leader Security Vehicles" title="" /></li>
<li><img src="images/lifi.jpg" alt="Wifi vs Lifi" title="" /></li>
<li><img src="images/morse.jpg" alt="Morse" title="" /></li>
<li><img src="images/password-3.png" alt="Passwords" title="" /></li>
<li><img src="images/passwords-1.jpg" alt="Passwords 2" title="" /></li>
<li><img src="images/passwords-2.jpg" alt="Passwords 3" title="" /></li>
<li><img src="images/picks1.jpg" alt="Lock Picks" title="" /></li>
<li><img src="images/picks2.jpg" alt="Lock Picks 2" title="" /></li>
<li><img src="images/plugs.jpg" alt="Electric Plugs" title="" /></li>
<li><img src="images/productivity.jpg" alt="Productivity" title="" /></li>
<li><img src="images/regflow.jpg" alt="Registration Flow" title="" /></li>
<li><img src="images/sites.png" alt="Sites" title="" /></li>
<li><img src="images/tents.jpg" alt="Tents" title="" /></li>
<li><img src="images/tor.png" alt="Tor vs VPN" title="" /></li>
<li><img src="images/torvpnsorta.jpg" alt="Tor vs VPN 2" title="" /></li>
<li><img src="images/uber.jpg" alt="Uber" title="" /></li>
<li><img src="images/wifisec.jpg" alt="Wi-Fi" title="" /></li>
</ul>
<script src="script.js" type="text/javascript"></script>
</body>
</html>

38
infographics.md Normal file
View File

@ -0,0 +1,38 @@
Infographics Gallery
====================
These are various infographics I've found around Reddit, mostly,
and collected here. They are here in part as a way of testing
an approach to using Bittorrent-over-I2P as a peer-to-peer way
of backing the resources on the site.
- ![Types of Attacks](images/attacks.jpg)
- ![Security Awareness](images/awareness.jpg)
- ![Bank Note Security](images/banknotes.jpg)
- ![Barricading a Door](images/barricade.jpg)
- ![Burglar Defenses](images/burglars.png)
- ![Cell Phones](images/cells.jpg)
- ![Computer Security](images/csec2.jpg)
- ![Computer Security 2](images/csec.jpg)
- ![Etherpad](images/etherpad.jpg)
- ![Knots](images/knots.jpeg)
- ![Languages](images/langs1.png)
- ![Languages 1](images/langs2.png)
- ![Laptop Security](images/laptopsec.jpg)
- ![Leader Security Vehicles](images/leadersec.jpg)
- ![Wifi vs Lifi](images/lifi.jpg)
- ![Morse](images/morse.jpg)
- ![Passwords](images/password-3.png)
- ![Passwords 2](images/passwords-1.jpg)
- ![Passwords 3](images/passwords-2.jpg)
- ![Lock Picks](images/picks1.jpg)
- ![Lock Picks 2](images/picks2.jpg)
- ![Electric Plugs](images/plugs.jpg)
- ![Productivity](images/productivity.jpg)
- ![Registration Flow](images/regflow.jpg)
- ![Sites](images/sites.png)
- ![Tents](images/tents.jpg)
- ![Tor vs VPN](images/tor.png)
- ![Tor vs VPN 2](images/torvpnsorta.jpg)
- ![Uber](images/uber.jpg)
- ![Wi-Fi](images/wifisec.jpg)

View File

@ -18,6 +18,7 @@ are also I2P labs projects.
* [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/) * [I2P Browser Fingerprint Gallery](I2P-Browser-Attackability-Evaluation/)
This is an ongoing evaluation of the various ways there are to configure This is an ongoing evaluation of the various ways there are to configure
browsers for I2P and a developing rating system for them. browsers for I2P and a developing rating system for them.
* [InfoGraphic Gallery for testing X-I2P-TorrentLocation](infographics.html)
### Go(golang) I2P Tools ### Go(golang) I2P Tools