Darknet: I2P

Note: Links on this page use the anonym.to service.

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.

The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering a not censorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments - even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech.

Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.

I2P is still a work in progress. It should not be relied upon for "guaranteed" anonymity at this time, due to the relatively small size of the network and the lack of extensive academic review. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks.

I2P works by routing traffic through other peers, as shown in the following picture. All traffic is encrypted end-to-end. For more information about how I2P works, see the Introduction.

Official website: http://www.i2p2.de/

eepSite

An eepSite is a webserver who's true identity is hidden by the mixnet structure of I2P. For practical purposes, it works just as a normal site or a freesite. You build it locally with your favorite HTML authoring tool, then register it in your address book by which it becomes accessible for those that are in your book.

Official website: http://www.eepsite.com/

Messaging

The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). Thus I2P is a network that sits on top of another network (in this case, it sits on top of the internet) and can deliver a message anonymously and securely to another location.

Many applications are already available: See description of i2ptunnel: http://www.i2p2.de/i2ptunnel

Comment

You need to be a member of #Anonymous #AntiSec #LulzSec #OWS to add comments!

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
"Just another bizarre chapter in WWII that seems more suspect as paranormal."
4 hours ago
Doc Vega's 7 blog posts were featured
5 hours ago
Burbia's blog post was featured

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
5 hours ago
Less Prone commented on Burbia's blog post Former President Trump?
"It must be an unintended mistake "former". But that Trump demanded to keep Khan away is a…"
5 hours ago
Less Prone favorited Doc Vega's blog post The Mistake We Made in America
5 hours ago
Less Prone favorited Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
5 hours ago
Less Prone commented on Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
"Quite an uplifting story of the winter war. Finland was overpowered by ten to one and could still…"
5 hours ago
Doc Vega posted a blog post

Elon Weighs in on Charlie Kirk's Assassination and How it is an Instrument of Social Control

For a very long time now there has been in place mass population behavioral control operations that…See More
yesterday
Doc Vega commented on Doc Vega's blog post The Forest Devil
"Less Prone Thanks Buddy I worked on it for 3 days! "
Friday
Less Prone favorited Doc Vega's blog post The Forest Devil
Friday
Less Prone commented on Doc Vega's blog post The Forest Devil
"You have spun a great story, congratulations!"
Friday
cheeki kea commented on Bob of the Family Renner's photo
Friday
Doc Vega posted a blog post
Thursday
tjdavis posted blog posts
Thursday
Doc Vega posted photos
Wednesday
tjdavis posted a blog post
Wednesday
Doc Vega commented on Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
"Les prone, Thanks Buddy! "
Tuesday
Doc Vega posted a blog post
Tuesday
tjdavis posted a photo
Tuesday
Doc Vega commented on Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
"Less Prone as usual the official version of the truth does not match the evidence and is labeled…"
Oct 4

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted