
I2P Anonymous Network
What is I2P? The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.
I2P 匿名网络
i2p 是什么? I2P (隐形互联网)是一个完全加密的匿名网络层,它可以保护您的位置和活动。 每天,人们都在使用这个网络来与人联系而不用担心他们被跟踪或数据被收集。
Download - I2P
It is now possible to install all I2P components using a single package (No Java required). To try out the new installer, click below. This bundle can also be used to configure a Firefox Profile. It will not interfere with an existing I2P installation if one exists. I2P …
A Gentle Introduction to How I2P Works - I2P
I2P is a project to build, deploy, and maintain a network supporting secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency.
Intro - I2P
What Can I Do On The I2P Network? The network provides an application layer for services, applications, and network managment. The network also has its own unique DNS that allows self hosting and mirroring of content from the Internet (Clearnet). The I2P network functions the same way the Internet does.
I2P: A scalable framework for anonymous communication - I2P
I2P uses cryptography at several protocol layers for encryption, authentication, and verification. The major protocol layers are: transports, tunnel build messages, tunnel layer encryption, network database messages, and end-to-end (garlic) messages.
简介 - I2P
The I2P network is a fully encrypted peer-to-peer overlay network. An observer cannot see a message's contents, source, or destination. No one can see where traffic is coming from, where it is going, or what the contents are.
Frequently Asked Questions - I2P
I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination.
A Gentle Introduction to How I2P Works - I2P
I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties. For example, today there are both in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web (allowing anonymous web browsing).
Web Browser Configuration - I2P
A web browser will need to be configured to access sites and services on the I2P network, and to utilize outproxies. Below are walkthroughs for some of the most popular browsers. Firefox Profile for Windows. If you are using Windows, the recommended way of accessing the I2P network is using the Firefox profile.