LATEST SITE ACTIVITY 

Top Content via 12160 RSS Feeds

Updated Drop Down Menu

-hover cursor over main menu for more Links

Darknet: I2P

Note: Links on this page use the anonym.to service.

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.

The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering a not censorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments - even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech.

Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.

I2P is still a work in progress. It should not be relied upon for "guaranteed" anonymity at this time, due to the relatively small size of the network and the lack of extensive academic review. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks.

I2P works by routing traffic through other peers, as shown in the following picture. All traffic is encrypted end-to-end. For more information about how I2P works, see the Introduction.

Official website: http://www.i2p2.de/

eepSite

An eepSite is a webserver who's true identity is hidden by the mixnet structure of I2P. For practical purposes, it works just as a normal site or a freesite. You build it locally with your favorite HTML authoring tool, then register it in your address book by which it becomes accessible for those that are in your book.

Official website: http://www.eepsite.com/

Messaging

The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). Thus I2P is a network that sits on top of another network (in this case, it sits on top of the internet) and can deliver a message anonymously and securely to another location.

Many applications are already available: See description of i2ptunnel: http://www.i2p2.de/i2ptunnel

Comment

You need to be a member of #Anonymous #AntiSec #LulzSec #OWS to add comments!

Photos

Loading…
  • Add Photos
  • View All
Members only

 

 

 

Save BIG on your monthly Mobile Cell phone bill

Mention Joe Rogan  --Get a $25 Credit Discount!

 

Please remember this website is supported by your donations...

© 2017   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2015 - all rights reserved. unless otherwise noted