Tor browser provides a great brain dead simple interface for using the internet anonymously. Sadly you cannot really hack on it easily because modifying defaults is considered harmful by most people (opinion). This is a step by step guide on configuring a browser to use i2p for i2p and tor for everything else.
This configuration will not protect you from web browser exploits, fingerprinting, session tagging, traffic correlation, local rootkit, etc.
- Linux (any flavor)
- i2pd (or java i2p if you really want to)
The basic setup is the following:
your browser -> privoxy -> tor -> internet / onion | V i2pd -> i2p
see here on how to install i2pd from latest source code
see here on how to install tor from latest source code
For debian or ubuntu based distributions you can do
sudo apt install privoxy and it'll get privoxy. If you're using Fedora it's …