Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Technical design  



1.1  Releases  







2 Funding  





3 Software  



3.1  General networking  





3.2  Chat  





3.3  File sharing  



3.3.1  Bridging to clearnet  







3.4  Email  





3.5  Instant messaging  





3.6  Publishing  





3.7  Routers  





3.8  The Privacy Solutions project  





3.9  Android  





3.10  Cryptocurrency  







4 Terminology  





5 Vulnerabilities  





6 I2PCon  





7 See also  



7.1  Software  







8 References  





9 External links  














I2P






العربية
Català
Čeština
Deutsch
Español
Esperanto
فارسی
Français

Italiano
Magyar
Монгол
Nederlands

Polski
Português
Русский
Simple English
Suomi
Svenska
ி

Türkçe
Українська
Tiếng Vit


 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 




In other projects  



Wikimedia Commons
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


This article relies excessively on referencestoprimary sources. Please improve this article by adding secondary or tertiary sources.
Find sources: "I2P" – news · newspapers · books · scholar · JSTOR
(August 2017) (Learn how and when to remove this message)

Original author(s)

I2P Team[1]

Initial release

2003; 21 years ago (2003)

Stable release

2.5.2[2] Edit this on Wikidata / 15 May 2024; 2 months ago (15 May 2024)

Repository

Written in

Java

Operating system

Cross-platform: Unix-like (Android, Linux, BSD, macOS), Microsoft Windows

Available in

English, Spanish
Incomplete translations: Russian, French, Romanian, German, Swedish, Italian, Portuguese, Chinese, Dutch, Polish, Hungarian, Arabic, Japanese, Estonian, Persian[3]

Type

Anonymity application, Overlay network, mix network, garlic router, peer-to-peer

License

Free/Open Source – different licenses for different parts[4] Public domain, BSD, GPL, MIT

Website

geti2p.net

Part of a serieson

File sharing

  • Online video platform
  • Peer to peer
  • Usenet
  • Web hosting
  • WebRTC
  • XDCC
  • Dailymotion
  • PeerTube
  • Putlocker
  • YouTube
  • Demonoid
  • ExtraTorrent
  • EZTV
  • isoHunt
  • FitGirl Repacks
  • KickassTorrents
  • Nyaa Torrents
  • RARBG
  • Rutracker.org
  • Tamil Rockers
  • The Pirate Bay
  • YIFY
  • YourBittorrent
  • Internet Archive
  • Library Genesis
  • Sci-Hub
  • Direct Connect
  • eDonkey
  • Gnutella
  • Gnutella2
  • Hyphanet
  • I2P
  • Soulseek
  • DC++
  • eMule
  • Filetopia
  • μTorrent
  • OnionShare
  • qBittorrent
  • Shareaza
  • Transmission
  • Tribler
  • Vuze
  • WinMX
  • Kodi
  • Popcorn Time
  • Torrents-Time
  • Darknet
  • Friend-to-friend
  • Private P2P
  • Proxy server
  • Seedbox
  • VPN
  • Legality
  • BitTorrent issues
  • Japan
  • Singapore
  • UK
  • USA
  • Comparison of BitTorrent sites
  • Comparison of eDonkey software
  • Comparison of Internet Relay Chat clients
  • Comparison of Usenet newsreaders
  • t
  • e
  • The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses.[5]

    Technical design[edit]

    I2P started in 2003 as a fork of Freenet.[6][7]

    The network is strictly message-based, like IP, but a library is available to allow reliable streaming communication on top of it (similar to Non-blocking IO-based TCP, although from version 0.6, a new Secure Semi-reliable UDP transport is used[8]). All communication is end-to-end encrypted (in total, four layers of encryption are used when sending a message) through garlic routing,[9] and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys), so that neither senders nor recipients of messages need to reveal their IP address to the other side or to third-party observers.

    Although many developers had been a part of the Invisible IRC Project (IIP)[10] and Freenet communities, significant differences exist between their designs and concepts. IIP was an anonymous centralized IRC server. Freenet is a censorship-resistant distributed data store. I2P is an anonymous peer-to-peer distributed communication layer designed to run any traditional internet service (e.g. Usenet, email, IRC, file sharing, Web hosting and HTTP, or Telnet), as well as more traditional distributed applications (e.g. a distributed data store, a web proxy network using Squid, or DNS).

    Many developers of I2P are known only under pseudonyms. While the previous main developer, jrandom, is currently on hiatus,[11] others, such as zzz, killyourtv, and Complication have continued to lead development efforts,[citation needed] and are assisted by numerous contributors.[1]

    I2P uses 2048bit ElGamal/AES256/SHA256+Session Tags encryption[12] and Ed25519 EdDSA/ECDSA signatures.[13]

    Releases[edit]

    This section needs to be updated. Please help update this article to reflect recent events or newly available information.
    Last update: v1.6.1 - 2021-11-29
    (May 2024)

    I2P has had a stable release every six to eight weeks. Updates are distributed via I2P torrents and are signed by the release manager (generally zzzorstr4d).

    I2P Versions

    Version

    Release date

    Release Notes

    Old version, no longer maintained: 0.9.11

    2014-02-08

    Support for outproxy plugins, improves lease set lookup security, and reduces memory usage.[14]

    Old version, no longer maintained: 0.9.12

    2014-03-31

    Support for ECDSA and updates to Jetty 8.[15]

    Old version, no longer maintained: 0.9.13

    2014-05-22

    SusiMail improvements and fixes for firewalled router.[16]

    Old version, no longer maintained: 0.9.14

    2014-07-26

    Critical fixes for XSS and remote execution vulnerabilities.[17]

    Old version, no longer maintained: 0.9.14.1

    2014-08-09

    I2PSnark and console fixes.[18]

    Old version, no longer maintained: 0.9.15

    2014-09-20

    Preliminary support for Ed25519 EdDSA signatures.[19]

    Old version, no longer maintained: 0.9.16

    2014-11-01

    Add support for stronger Router Info signatures.[20]

    Old version, no longer maintained: 0.9.17

    2014-11-30

    Signed news, ECDSA tunnels by default.[21]

    Old version, no longer maintained: 0.9.18

    2015-02-22

    Shortened the startup time, and reduced latency throughout our network protocols.[22]

    Old version, no longer maintained: 0.9.19

    2015-04-12

    Several fixes and improvements for floodfill performance.[23]

    Old version, no longer maintained: 0.9.20

    2015-06-02

    Important bug fixes, and several changes to increase floodfill capacity in the network.[24]

    Old version, no longer maintained: 0.9.21

    2015-07-31

    Contains several changes to add capacity to the network, increase the efficiency of the floodfills, and use bandwidth more effectively.[25]

    Old version, no longer maintained: 0.9.22

    2015-09-12

    Fixes for I2PSnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.[26]

    Old version, no longer maintained: 0.9.23

    2015-11-19

    Accelerates the rekeying process.[27]

    Old version, no longer maintained: 0.9.24

    2016-01-27

    A new version of SAM (v3.2) and numerous bug fixes and efficiency improvements. The first release to require Java 7.[28]

    Old version, no longer maintained: 0.9.25

    2016-03-22

    A new version of SAM (v3.3), QR codes for sharing hidden services, identicons and router families.[29]

    Old version, no longer maintained: 0.9.26

    2016-06-07

    Major upgrade to the native crypto library, a new addressbook subscription protocol with signatures, and major improvements to the Debian/Ubuntu packaging.[30]

    Old version, no longer maintained: 0.9.27

    2016-10-17

    Improvements in IPv6 transports, SSU peer testing, and hidden mode.[31]

    Old version, no longer maintained: 0.9.28

    2016-12-12

    Updates for a number of bundled software, fixes for IPv6 peer testing, improvements to detect and block potentially malicious peers. Preliminary fixes for Java 9.[32]

    Old version, no longer maintained: 0.9.29

    2017-02-27

    Support for NTP over IPv6, preliminary Docker support, translated main pages. We now pass same-origin Referrer headers through the HTTP proxy. There are more fixes for Java 9, although we do not yet recommend Java 9 for general use.[33]

    Old version, no longer maintained: 0.9.30

    2017-05-03

    Support for Debian Stretch and Ubuntu Zesty, upgraded to Jetty 9 and Tomcat 8, support for the migration of old DSA-SHA1 hidden services to the EdDSA signature type.[34]

    Old version, no longer maintained: 0.9.31

    2017-08-07

    Refreshed the router console to improve readability, improved accessibility and cross-browser support, and general tidying up.[35]

    Old version, no longer maintained: 0.9.32

    2017-11-07

    0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail). We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS. Added some checks in the console to resist rebinding attacks.[36]

    Old version, no longer maintained: 0.9.33

    2018-01-30

    0.9.33 contains bug fixes for i2psnark, i2ptunnel, streaming, and SusiMail. Updates for reseed proxying, and default rate limiting.[37]

    Old version, no longer maintained: 0.9.34

    2018-04-10

    0.9.34 contains bug fixes for i2ptunnel, router console, SusiMail, routing and transport along with Changes to SusiMail and UPnP.[38]

    Old version, no longer maintained: 0.9.35

    2018-06-26

    0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.[39]

    Old version, no longer maintained: 0.9.36

    2018-08-23

    0.9.36 implements a new, more secure transport protocol called NTCP2. It is disabled by default, but you may enable it for testing. NTCP2 will be enabled in the next release.[40]

    Old version, no longer maintained: 0.9.37

    2018-10-04

    0.9.37 enables the faster, more secure transport protocol called NTCP2.[41]

    Old version, no longer maintained: 0.9.38

    2019-01-22

    0.9.38 includes a new first-install wizard with a bandwidth tester. We've added support for the latest GeoIP database format. There's a new Firefox profile installer and a new, native Mac OSX installer on our website. Work continues on supporting the new "LS2" netdb format.[42]

    Old version, no longer maintained: 0.9.39

    2019-03-21

    0.9.39 includes extensive changes for the new network database types (proposal 123). We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications. There are numerous performance improvements and bug fixes.[43]

    Old version, no longer maintained: 0.9.40

    2019-05-07

    0.9.40 includes support for the new encrypted leaseset format. We disabled the old NTCP 1 transport protocol. There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections.[44]

    Old version, no longer maintained: 0.9.41

    2019-07-02

    0.9.41 continues the work to implement new features for proposal 123, including per-client authentication for encrypted leasesets. The console has an updated I2P logo and several new icons. We've updated the Linux installer.[45]

    Old version, no longer maintained: 0.9.42

    2019-08-28

    0.9.42 continues the work to make I2P faster and more reliable. It includes several changes to speed up our UDP transport. We have split up the configuration files to enable future work for more modular packaging. We continue work to implement new proposals for faster and more secure encryption. There are, of course, a lot of bug fixes also.[46]

    Old version, no longer maintained: 0.9.43

    2019-10-22

    0.9.43 release continues work on stronger security and privacy features and performance improvements. Our implementation of the new leaseset specification (LS2) is now complete. We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release. Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes.[47]

    Old version, no longer maintained: 0.9.44

    2019-12-01

    0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.[48]

    Old version, no longer maintained: 0.9.45

    2020-02-25

    0.9.45 contains bug fixes.[49]

    Old version, no longer maintained: 0.9.46

    2020-05-25

    0.9.46 contains new ECIES Encryption.[50]

    Old version, no longer maintained: 0.9.47

    2020-08-24

    0.9.47 enables new encryption for some services, now requires Java 8 and Sybil analysis and blocking is now enabled by default.[51]

    Old version, no longer maintained: 0.9.48

    2020-11-30

    0.9.48 enables new encryption for most services, has significant performance improvements.[52]

    Old version, no longer maintained: 0.9.49

    2021-02-17

    0.9.49 improves SSU transport and begins transition to X25519 encryption for routers.[53]

    Old version, no longer maintained: 0.9.50

    2021-05-17

    0.9.50 continues transition to X25519 encryption for routers, enables DoH for reseeding and improves support for IPv6.[54]

    Old version, no longer maintained: 1.5.0

    2021-08-23

    1.5.0 adds short tunnel build messages, continues transition to X25519 encryption for routers and improves performance.[55]

    Current stable version: 1.6.1[56]

    2021-11-29

    1.6.1 further accelerates transition to X25519 for routers, enables short tunnel build messages and improves SSU performance.[57]

    Funding[edit]

    The website states that "funding for I2P comes entirely from donations".[58] Admins and managers of the project said that "the core project itself doesn't take donations". These should instead go to secondary applications or be spent on hiring others, to work on I2P.[59] Support for the onboarding for I2P came from the Open Technology Fund.[60][61] In contrast to The Tor Project, I2P has "not the financial or legal infrastructure to support a network of exit nodes".[62] The reseed servers,[63] a sort of bootstrap nodes,[64] which connect the user with the initial set of peers to join the I2P-network, should be run by volunteers.[65]

    Software[edit]

    I2P 0.9.31-0 router console

    Since I2P is an anonymizing network layer, it is designed so other software can use it for anonymous communication. As such, there are a variety of tools currently available for I2P or in development.

    The I2P router is controlled through the router console, which is a web frontend accessed through a web browser.

    General networking[edit]

    Chat[edit]

    File sharing[edit]

    Bridging to clearnet[edit]

    Currently, Vuze and BiglyBT are the torrent clients that make clearnet (connections not through I2P) torrents available on I2P and vice versa. Depending on the client settings, torrents from the internet can be made available on I2P (via announcements to I2P's DHT network) and torrents from I2P can be made available to the internet. For this reason, torrents previously published only on I2P can be made available to the entire Internet, and users of I2P can often download popular content from the Internet while maintaining the anonymity of I2P. As of August 2022, the default outproxy is exit.stormycloud.i2p which is run by StormyCloud Inc.[79][80][81]

    Email[edit]

    This section does not cite any sources. Please help improve this sectionbyadding citations to reliable sources. Unsourced material may be challenged and removed. (February 2024) (Learn how and when to remove this message)
    A screenshot of the inbox of I2P-Bote.

    Instant messaging[edit]

    Publishing[edit]

    Routers[edit]

    [icon]
    This section needs expansion with: i2pd. You can help by adding to it. Relevant discussion may be found on Talk:I2P. (May 2024)

    The Privacy Solutions project[edit]

    The Privacy Solutions project,[86] a new organization that develops and maintains I2P software, launched several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.

    These efforts include:[87]

    The code repository and download sections for the i2pd and Abscond project is available for the public to review and download.[89] Effective January, 2015 i2pd is operating under PurpleI2P.[90]

    Android[edit]

    I2P running on Android.

    Cryptocurrency[edit]

    Some cryptocurrencies that support I2P are listed below.

    Terminology[edit]

    I2P's mascot, itoopie, who is looking through a magnifying glass.[94]
    Eepsite
    Eepsites are websites that are hosted anonymously within the I2P network. Eepsite names end in .i2p, such as ugha.i2porforum.i2p. EepProxy can locate these sites through the cryptographic identifier keys stored in the hosts.txt file found within the I2P program directory. Typically, I2P is required to access these eepsites.[95]
    .i2p
    'I2p' is a pseudo-top-level domain which is only valid within the I2P overlay network scope. .i2p names are resolved by browsers by submitting requests to EepProxy which will resolve names to an I2P peer key and will handle data transfers over the I2P network while remaining transparent to the browser.[96]
    EepProxy
    The EepProxy program handles all communication between the browser and any eepsite. It functions as a proxy server that can be used by any web browser.
    Peers, I2P nodes
    Other machines using I2P that are connected to user's machine within the network. Each machine within the network shares the routing and forwarding of encrypted packets.
    Tunnels
    Every ten minutes, a connection is established between the user's machine and another peer. Data to and from the user, along with the data for other peers (routed through the user's machine), pass through these tunnels and are forwarded to their final destination (may include more jumps).[97]
    netDb
    The distributed hash table (DHT) database based on the Kademlia algorithm that holds information on I2P nodes and I2P eepsites. This database is split up among routers known as "floodfill routers". When a user wants to know how to contact an eepsite, or where more peers are, they query the database.[98][95]

    Vulnerabilities[edit]

    Denial of service attacks are possible against websites hosted on the network, though a site operator may secure their site against certain versions of this type of attack to some extent.[99][100]

    Azero-day vulnerability was discovered for I2P in 2014, and was exploited to de-anonymize at least 30,000 users. This included users of the operating system Tails.[101] This vulnerability was later patched.[102][103]

    A 2017 study examining how forensic investigators might exploit vulnerabilities in I2P software to gather useful evidence indicated that a seized machine which had been running I2P router software may hold unencrypted local data that could be useful to law enforcement. Records of which eepsites a user of a later-seized machine was interested in may also be inferred. The study identified a "trusted" I2P domain registrar ("NO.i2p") which appeared to have been abandoned by its administrator, and which the study identified as a potential target for law enforcement takeover. It alternatively suggested waiting for NO.i2p's server to fail, only to social engineer the I2P community into moving to a phony replacement. Another suggestion the study proposed was to register a mirror version of a target website under an identical domain.[100]

    I2PCon[edit]

    David Dagon presenting at the first I2Pcon.

    From August 15, 2015 to August 16, 2015 an I2P convention was held in Toronto, Ontario.[104] The conference was hosted by a local hackerspace, Hacklab. The conference featured presentations from I2P developers and security researchers.

    See also[edit]

  • Deep web
  • Darknet
  • Garlic routing
  • Key-based routing
  • Public-key cryptography
  • Rendezvous protocol
  • Secure communication
  • Threat model
  • Software[edit]

  • Mixnet
  • Retroshare
  • Tor
  • Tribler
  • ZeroNet
  • References[edit]

    1. ^ a b "I2P Project Members". geti2p.net. Archived from the original on 26 February 2019. Retrieved 22 November 2015.
  • ^ "2.5.2 Release - Blog - I2P". Retrieved 16 May 2024.
  • ^ I2P (project), Transifex, archived from the original on 2013-12-25, retrieved 2014-02-12.
  • ^ "Licenses", Get involved, Get I2P, archived from the original on 2013-12-24, retrieved 2013-12-24.
  • ^ Gallagher, Sean (2015-01-13). "Under the hood of I2P, the Tor alternative that reloaded Silk Road". Ars Technica. Archived from the original on 2019-07-12. Retrieved 2019-08-17.
  • ^ "Anonymity Networks: VPNs, Tor, and I2P | Restore Privacy". 3 February 2020. Archived from the original on 28 January 2021.
  • ^ Get I2P (blog), archived from the original on 2017-07-02, retrieved 2013-12-24.
  • ^ "Secure Semireliable UDP (SSU)". geti2p.net. Archived from the original on 6 September 2023. Retrieved 18 May 2023.
  • ^ "Garlic Routing – I2P". geti2p.net. Archived from the original on 2019-11-16. Retrieved 2017-12-12.
  • ^ "IIP", Invisible IP, Source forge, archived from the original on 2009-05-18, retrieved 2012-02-11.
  • ^ "Jrandom's Announcement – I2P". geti2p.net. Archived from the original on 2017-08-19. Retrieved 2017-07-15.
  • ^ "ElGamal/AES + SessionTag Encryption – I2P". geti2p.net. Archived from the original on 2017-03-31. Retrieved 2017-03-30.
  • ^ "Crypto/ECDSA – I2P Bugtracker". trac.i2p2.de. Archived from the original on 2015-05-20. Retrieved 2017-03-30.
  • ^ zzz (8 February 2014). "0.9.11 Release". geti2p.net. Archived from the original on 2 September 2016. Retrieved 15 September 2015.
  • ^ zzz (31 March 2014). "0.9.12 Release". geti2p.net. Archived from the original on 2 September 2016. Retrieved 15 September 2015.
  • ^ zzz (22 May 2014). "0.9.13 Release". geti2p.net. Archived from the original on 2 August 2015. Retrieved 15 September 2015.
  • ^ zzz (26 July 2014). "0.9.14 Release". geti2p.net. Archived from the original on 6 October 2015. Retrieved 15 September 2015.
  • ^ zzz (9 August 2014). "0.9.14.1 Release". geti2p.net. Archived from the original on 2 September 2016. Retrieved 15 September 2015.
  • ^ zzz (20 September 2014). "0.9.15 Release". geti2p.net. Archived from the original on 28 June 2017. Retrieved 15 September 2015.
  • ^ zzz (1 November 2014). "0.9.16 Release". geti2p.net. Archived from the original on 3 March 2016. Retrieved 15 September 2015.
  • ^ zzz (30 November 2014). "0.9.17 Release". geti2p.net. Archived from the original on 17 December 2015. Retrieved 15 September 2015.
  • ^ zzz (22 February 2015). "0.9.18 Release". geti2p.net. Archived from the original on 11 September 2015. Retrieved 15 September 2015.
  • ^ zzz (12 April 2015). "0.9.19 Release". geti2p.net. Archived from the original on 19 April 2015. Retrieved 4 May 2015.
  • ^ zzz (2 June 2015). "0.9.20 Release". geti2p.net. Archived from the original on 11 September 2015. Retrieved 15 September 2015.
  • ^ zzz (31 July 2015). "0.9.21 Release". geti2p.net. Archived from the original on 11 September 2015. Retrieved 2 August 2015.
  • ^ zzz (12 December 2015). "0.9.22 Release". geti2p.net. Archived from the original on 4 March 2016. Retrieved 13 September 2015.
  • ^ str4d (19 November 2015). "0.9.23 Release". geti2p.net. Archived from the original on 21 November 2015. Retrieved 20 November 2015.{{cite web}}: CS1 maint: numeric names: authors list (link)
  • ^ zzz (27 January 2016). "0.9.24 Release". geti2p.net. Archived from the original on 2 February 2016. Retrieved 29 January 2016.
  • ^ zzz (3 March 2016). "0.9.25 Release". geti2p.net. Archived from the original on 3 April 2016. Retrieved 23 March 2016.
  • ^ zzz (7 June 2016). "0.9.26 Release". geti2p.net. Archived from the original on 2 September 2016. Retrieved 7 June 2016.
  • ^ zzz (17 October 2016). "0.9.27 Release". geti2p.net. Archived from the original on 6 February 2017. Retrieved 6 January 2017.
  • ^ zzz (12 December 2016). "0.9.28 Release". geti2p.net. Archived from the original on 29 August 2017. Retrieved 15 July 2017.
  • ^ zzz (27 February 2017). "0.9.29 Release". geti2p.net. Archived from the original on 6 March 2017. Retrieved 5 March 2017.
  • ^ zzz (3 May 2017). "0.9.30 Release". geti2p.net. Archived from the original on 3 October 2020. Retrieved 14 June 2017.
  • ^ zzz (7 August 2017). "0.9.31 Release". geti2p.net. Archived from the original on 11 August 2017. Retrieved 11 August 2017.
  • ^ zzz (11 November 2017). "0.9.32 Release". geti2p.net. Archived from the original on 15 November 2017. Retrieved 15 November 2017.
  • ^ zzz (30 January 2018). "0.9.33 Release". geti2p.net. Archived from the original on 31 January 2018. Retrieved 30 January 2018.
  • ^ zzz (10 April 2018). "0.9.34 Release". geti2p.net. Archived from the original on 12 April 2018. Retrieved 11 April 2018.
  • ^ zzz (26 June 2018). "0.9.35 Release". geti2p.net. Archived from the original on 29 June 2018. Retrieved 29 June 2018.
  • ^ zzz (23 August 2018). "0.9.36 Release". geti2p.net. Archived from the original on 27 March 2019. Retrieved 29 January 2019.
  • ^ zzz (4 October 2018). "0.9.37 Release". geti2p.net. Archived from the original on 7 January 2019. Retrieved 29 January 2019.
  • ^ zzz (22 January 2019). "0.9.38 Release". geti2p.net. Archived from the original on 29 January 2019. Retrieved 29 January 2019.
  • ^ zzz (21 March 2019). "0.9.39 Release". geti2p.net. Archived from the original on 22 March 2019. Retrieved 22 March 2019.
  • ^ zzz (7 May 2019). "0.9.40 Release". geti2p.net. Archived from the original on 2 August 2019. Retrieved 7 December 2019.
  • ^ zzz (2 July 2019). "0.9.41 Release". geti2p.net. Archived from the original on 13 August 2019. Retrieved 13 August 2019.
  • ^ zzz (28 August 2019). "0.9.42 Release". geti2p.net. Archived from the original on 3 October 2020. Retrieved 27 September 2020.
  • ^ zzz (22 October 2019). "0.9.43 Release". geti2p.net. Archived from the original on 25 November 2019. Retrieved 23 November 2019.
  • ^ zzz (1 December 2019). "0.9.44 Release". geti2p.net. Archived from the original on 5 December 2019. Retrieved 7 December 2019.
  • ^ zzz (25 February 2020). "0.9.45 Release". geti2p.net. Archived from the original on 21 October 2020. Retrieved 3 October 2020.
  • ^ zzz (25 May 2020). "0.9.46 Release". geti2p.net. Archived from the original on 20 September 2020. Retrieved 3 October 2020.
  • ^ zzz (24 August 2020). "0.9.47 Release". geti2p.net. Archived from the original on 27 August 2020. Retrieved 9 September 2020.
  • ^ zzz (30 November 2020). "0.9.48 Release". geti2p.net. Archived from the original on 20 January 2021. Retrieved 6 January 2021.
  • ^ zzz (17 February 2021). "0.9.49 Release". geti2p.net. Archived from the original on 13 December 2021. Retrieved 13 December 2021.
  • ^ zzz (17 May 2021). "0.9.50 Release". geti2p.net. Archived from the original on 26 May 2021. Retrieved 1 June 2021.
  • ^ zzz (23 August 2021). "1.5.0 Release". geti2p.net. Archived from the original on 13 December 2021. Retrieved 13 December 2021.
  • ^ 1.6.0 was tagged, but not released.
  • ^ zzz (29 September 2021). "1.6.1 Release". geti2p.net. Archived from the original on 13 December 2021. Retrieved 13 December 2021.
  • ^ "I2P: A scalable framework for anonymous communication – Introduction". I2P Website. Archived from the original on 2022-03-14. Retrieved 2022-03-14.
  • ^ idk aka. eyedeekay (2022-03-06). "Network privacy via i2p w/ idk and Sadie". Opt Out Podcast. 00:55:43. Archived from the original on 2022-03-07. Retrieved 2022-03-14.
  • ^ Mascis, Sadie (2022-03-06). "Network privacy via i2p w/ idk and Sadie"". Opt Out Podcast. 00:54:20. Archived from the original on 2022-03-07. Retrieved 2022-03-13.
  • ^ Open Technology Fund. "5G and Human Rights". Open Technology Fund Website. U.S. Agency for Global Media. Archived from the original on 2022-03-14. Retrieved 2022-03-14.
  • ^ idk aka. eyedeekay (2022-03-06). "Network privacy via i2p w/ idk and Sadie". Opt Out Podcast. 00:34:20. Archived from the original on 2022-03-07. Retrieved 2022-03-13.
  • ^ "How to Set up a Reseed Server". I2P Website. Archived from the original on 2022-03-14. Retrieved 2022-03-13.
  • ^ "How to volunteer by helping I2P-Bote bootstrap – Blog". I2p Website. Archived from the original on 2022-04-07. Retrieved 2022-03-13.
  • ^ idk aka. eyedeekay (2022-03-06). "Network privacy via i2p w/ idk and Sadie". Opt Out Podcast. 00:57:00. Archived from the original on 2022-03-07. Retrieved 2022-03-13.
  • ^ "SAM", API, I2P, archived from the original on 2013-12-24, retrieved 2013-12-24.
  • ^ "BOB", API, Get I2P, archived from the original on 2013-12-24, retrieved 2013-12-24.
  • ^ "GitHub – subgraph/Orchid". 7 March 2019. Archived from the original on 9 August 2017. Retrieved 20 October 2017 – via GitHub.
  • ^ R4SAS (2024-04-02), r4sas/Conversations-I2P, retrieved 2024-05-24{{citation}}: CS1 maint: numeric names: authors list (link)
  • ^ "Decentralized instant messenger (XMPP aka Jabber) - i2pd documentation". i2pd.readthedocs.io. Retrieved 2024-05-24.
  • ^ I2P Bittorrent FAQ (forum), DE: i2p2, archived from the original on 2011-11-03.
  • ^ The Hunting of the Snark Project – BitTorrent Application Suite, Klomp, archived from the original on 2013-11-24, retrieved 2013-12-22.
  • ^ "How To for I2P Network Plugin", I2PHelper (Howto) (setup tutorial), Vuze, archived from the original on 2015-02-25, retrieved 2015-02-23.
  • ^ "Rufus – BitTorrent Client". Sourceforge. Archived from the original on 2010-01-07. Retrieved 2006-09-06..
  • ^ "GitHub – majestrate/XD: i2p bittorrent client". 22 March 2019. Archived from the original on 29 July 2017. Retrieved 2 November 2017 – via GitHub.
  • ^ "Official Nachtblitz Resource". Archived from the original on 2022-11-01. Retrieved 2022-11-01.
  • ^ "r/i2p – Introducing MuWire – a file-sharing application for I2P". reddit. 31 May 2019. Archived from the original on 2022-04-07. Retrieved 2019-12-17.
  • ^ "Shutdown notice and Java I2P warning (#178) · zlatinb/muwire@8dbd094". GitHub. Retrieved 2024-05-03.
  • ^ "Vuze Speeds Up Torrent Downloads Through "Swarm Merging"". TorrentFreak. 20 March 2015. Archived from the original on 17 October 2017. Retrieved 4 June 2016.
  • ^ "I2PHelper HowTo". VuzeWiki. Archived from the original on 20 October 2017. Retrieved 4 June 2016.
  • ^ "StormyCloud – I2P Outproxy | I2P Anonymous Network". stormycloud.org. Retrieved 2023-07-24.
  • ^ i2p/i2p.i2p-bote, The I2P Project, 2024-03-06, retrieved 2024-03-08
  • ^ Introducing I2P, Nov 10, 2015, archived from the original on November 25, 2015, retrieved November 11, 2015
  • ^ "PurpleI2P/i2pd". GitHub. Archived from the original on 2018-10-04. Retrieved 2018-08-20.
  • ^ "Invisible Internet Protocol Daemon". i2pd.website. Archived from the original on 2018-08-20. Retrieved 2018-08-20.
  • ^ Privacy Solutions project, archived from the original on 19 April 2018.
  • ^ List of ongoing Privacy Solutions projects, archived from the original on 2021-05-07, retrieved 2022-08-27.
  • ^ "Invisible Internet Protocol Daemon". i2pd.website. Archived from the original on 2018-08-20. Retrieved 2018-08-20.
  • ^ Active development, The Privacy Solutions, 22 September 2022, archived from the original on 12 November 2014, retrieved 16 January 2015
  • ^ Active development, Purple I2P, 22 September 2022, archived from the original on 4 February 2016, retrieved 7 February 2016
  • ^ Android App Releases, archived from the original on 2014-12-15, retrieved 2014-12-15
  • ^ Discontinued, Nightweb, archived from the original on 2017-07-04, retrieved 2015-04-26.
  • ^ "Add I2P support using I2P SAM by vasild · Pull Request #20685 · bitcoin/bitcoin". GitHub. Archived from the original on 2021-03-03. Retrieved 2021-04-03.
  • ^ "I2P con 2015 – Growing the Network, Spreading the Word, 03:41". YouTube. 2 September 2015. Archived from the original on 2022-04-07. Retrieved 2018-06-30.
  • ^ a b "Intro". I2P. Archived from the original on 6 April 2016. Retrieved 4 June 2016.
  • ^ "Naming and Addressbook – I2P". geti2p.net. Archived from the original on 29 March 2016. Retrieved 4 June 2016.
  • ^ "Tunnel Routing". I2P. Archived from the original on 26 March 2016. Retrieved 4 June 2016.
  • ^ "The Network Database". I2P. Archived from the original on 7 March 2016. Retrieved 4 June 2016.
  • ^ Kack, Christopher (2012-09-11). "Layer 7 DOS against I2P darknet". Kejsarmakten:Development. Archived from the original on 2012-10-14. Retrieved 2021-03-13.
  • ^ a b Bazli, Behnam; Wilson, Maxim; Hurst, William (2017-01-01). "The dark side of I2P, a forensic analysis case study". Systems Science & Control Engineering. 5 (1): 278–286. doi:10.1080/21642583.2017.1331770.
  • ^ Storm, Darlene (2014-07-24). "Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users". Computerworld. Archived from the original on 2020-09-29. Retrieved 2021-03-13.
  • ^ "I2P patched against de-anonymizing 0-day, Tails integration still to follow". Help Net Security. 2014-07-29. Archived from the original on 2020-12-10. Retrieved 2021-03-13.
  • ^ "0.9.14 Release – Blog – I2P". geti2p.net. Archived from the original on 2021-04-22. Retrieved 2021-03-13.
  • ^ "I2PCon: Mission Accomplished – Blog". I2P. Archived from the original on 10 June 2016. Retrieved 4 June 2016.
  • External links[edit]

    Technologies

  • .i2p
  • Garlic routing
  • Software

  • iMule
  • Robert
  • Vuze
  • Related Software

  • Freenet
  • GNUnet
  • Commons
  • Email clients

  • Autocrypt
  • Claws Mail
  • Enigmail
  • GPG (Gpg4win)
  • Kontact
  • Outlook
  • p≡p
  • PGP
  • Sylpheed
  • Thunderbird
  • Secure
    communication

    OTR

  • BitlBee
  • Centericq
  • ChatSecure
  • climm
  • Jitsi
  • Kopete
  • Profanity
  • SSH

  • lsh
  • OpenSSH
  • PuTTY
  • SecureCRT
  • WinSCP
  • wolfSSH
  • TLS & SSL

  • Bouncy Castle
  • BoringSSL
  • Botan
  • cryptlib
  • GnuTLS
  • JSSE
  • LibreSSL
  • MatrixSSL
  • NSS
  • OpenSSL
  • mbed TLS
  • BSAFE
  • SChannel
  • SSLeay
  • stunnel
  • TeamNote
  • wolfSSL
  • VPN

  • Hamachi
  • Openswan
  • OpenVPN
  • SoftEther VPN
  • strongSwan
  • Tinc
  • WireGuard
  • ZRTP

  • Linphone
  • Jami
  • Zfone
  • P2P

  • Briar
  • RetroShare
  • Tox
  • DRA

  • OMEMO
  • Proteus
  • Session
  • Signal Protocol
  • SimpleX
  • Disk encryption
    (Comparison)

  • BitLocker
  • CrossCrypt
  • Cryptoloop
  • dm-crypt
  • DriveSentry
  • E4M
  • eCryptfs
  • FileVault
  • FreeOTFE
  • GBDE
  • geli
  • LUKS
  • PGPDisk
  • Private Disk
  • Scramdisk
  • Sentry 2020
  • TrueCrypt
  • VeraCrypt
  • Anonymity

  • I2P
  • Java Anon Proxy
  • Tor
  • Vidalia
  • RetroShare
  • Ricochet
  • Wickr
  • File systems (List)

  • EFS
  • eCryptfs
  • LUKS
  • PEFS
  • Rubberhose
  • StegFS
  • Tahoe-LAFS
  • Security-focused
    operating system

  • Qubes
  • Service providers

  • Tresorit
  • Wuala
  • NordLocker
  • Educational

    Anti–computer forensics

  • BusKill
  • Related topics

  • Timeline of cryptography
  • Hash functions
  • Homomorphic encryption
  • End-to-end encryption
  • S/MIME
  • Commons
  • Networks,
    protocols

    Centralized

  • Soribada
  • Soulseek
  • Decentralized

  • DAT
  • eDonkey
  • FastTrack
  • Fopnu
  • Freenet
  • GNUnet
  • Gnutella
  • Gnutella2
  • I2P
  • IPFS
  • Kad
  • LBRY
  • OpenFT
  • OnionShare
  • Perfect Dark
  • Retroshare
  • Share
  • Tribler
  • WebTorrent
  • WinMX
  • Winny
  • ZeroNet
  • Historic

  • CuteMX
  • Kazaa
  • LimeWire
  • Morpheus
  • Napster
  • Scour
  • WASTE
  • Comparisons
    ofclients

  • BitTorrent
  • Direct Connect
  • eDonkey
  • Gnutella
  • Gnutella2
  • WebTorrent
  • Hyperlinks

  • Magnet
  • Metalink
  • Uses

  • Broadcatching
  • Disk sharing
  • Game and video sharing
  • Image sharing
  • Music sharing
  • Peercasting
  • Seedboxes
  • Sharing software
  • Web hosting (Freesite, IPFS, ZeroNet)
  • Legal aspects
  • Concepts

    Privacy

  • Darknet
  • Darkweb
  • Friend-to-friend
  • Open music model
  • Private P2P
  • Tor
  • Internal
    technologies

  • Merkle tree
  • NAT traversal
  • Peer exchange
  • BitTorrent protocol encryption
  • SHA-1
  • SHA-2
  • Super-seeding
  • BitTorrent tracker
  • UDP hole punching
  • Micro Transport Protocol
  • Background

  • National intranet
  • Censorship and blocking technologies
  • Blocks on specific websites
  • Principles

    With a proxy server

  • Web proxies
  • SSH
  • VPN
  • PAC
  • Without a proxy server

  • IPv6 transition mechanism
  • hosts
  • DNSCrypt
  • Domain fronting
  • Refraction networking
  • Anti-censorship software

    Free software

  • Shadowsocks
  • OnionShare
  • Outline VPN
  • GoAgent
  • PirateBox
  • VPN Gate
  • WireGuard
  • Proprietary software

  • Freegate
  • Ultrasurf
  • Hotspot Shield
  • Telex
  • Proxify
  • Browser extensions

  • uProxy
  • Anonymity

    Anonymous software

  • JAP (JonDonym)
  • Flash proxy
  • Mixmaster
  • Anonymous P2P network

  • I2P
  • StealthNet
  • Tribler
  • ZeroNet
  • Physical circumvention methods

  • USB dead drop
  • Relevant organizations

  • Turkey Blocks
  • Reference

    Italics indicates that maintenance of the tool has been discontinued. Category Commons


    Retrieved from "https://en.wikipedia.org/w/index.php?title=I2P&oldid=1233539118"

    Categories: 
    I2P
    Anonymous file sharing networks
    Application layer protocols
    Computer networking
    Cross-platform free software
    Cross-platform software
    Cryptographic software
    Dark web
    Distributed data storage
    Distributed data structures
    Distributed data storage systems
    Distributed file systems
    File sharing
    Free and open-source Android software
    Free communication software
    Free file transfer software
    Free file sharing software
    Free multilingual software
    Free network-related software
    Free routing software
    Free software programmed in Java (programming language)
    Garlic routing
    Hash-based data structures
    Internet privacy software
    Key-based routing
    Overlay networks
    Peer-to-peer computing
    Privacy software
    Software using the MIT license
    2003 software
    Hidden categories: 
    CS1 maint: numeric names: authors list
    Articles with short description
    Short description matches Wikidata
    Articles lacking reliable references from August 2017
    All articles lacking reliable references
    All articles with unsourced statements
    Articles with unsourced statements from September 2023
    Wikipedia articles in need of updating from May 2024
    All Wikipedia articles in need of updating
    Articles needing additional references from February 2024
    All articles needing additional references
    Articles containing potentially dated statements from 2015
    All articles containing potentially dated statements
    Articles with unsourced statements from September 2020
    Articles with unsourced statements from February 2024
    Articles to be expanded from May 2024
    All articles to be expanded
    Articles prone to spam from November 2017
     



    This page was last edited on 9 July 2024, at 16:27 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki