Free and open source project building an anonymous network
This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "I2P" – news · newspapers · books · scholar · JSTOR(August 2017) (Learn how and when to remove this template message)
Original author(s)
I2P Team[1]
Initial release
2003; 21 years ago (2003)
Stable release
2.3.0[2]
/ 30 June 2023; 8 months ago (30 June 2023)
Repository
github.com/i2p/i2p.i2p
Written in
Java
Operating system
Cross-platform: Unix-like (Android, Linux, BSD, macOS), Microsoft Windows
Free/Open Source – different licenses for different parts[4] Public domain, BSD, GPL, MIT
Website
geti2p.net
Part of a series on
File sharing
Technologies
File hosting services
Online video platform
Peer to peer
Usenet
Web hosting
WebRTC
XDCC
Video on demand sites
123Movies
Dailymotion
PeerTube
Putlocker
YouTube
BitTorrent sites
1337x
Demonoid
ExtraTorrent
EZTV
isoHunt
FitGirl Repacks
KickassTorrents
Nyaa Torrents
RARBG
Rutracker.org
Tamil Rockers
The Pirate Bay
YIFY
YourBittorrent
Academic/scholarly
ICanHazPDF
Internet Archive
Library Genesis
Sci-Hub
File sharing networks
BitTorrent
Direct Connect
eDonkey
Gnutella
Gnutella2
Hyphanet
I2P
Soulseek
P2P clients
BitComet
DC++
eMule
Filetopia
μTorrent
OnionShare
qBittorrent
Shareaza
Transmission
Tribler
Vuze
WinMX
Streaming programs
Butter Project
Kodi
Popcorn Time
Torrents-Time
Anonymous file sharing
Anonymous P2P
Darknet
Friend-to-friend
Private P2P
Proxy server
Seedbox
VPN
Development and societal aspects
Timeline
Legality
BitTorrent issues
By country or region
Canada
Japan
Singapore
UK
USA
Comparisons
Comparison of BitTorrent clients
Comparison of BitTorrent sites
Comparison of eDonkey software
Comparison of Internet Relay Chat clients
Comparison of Usenet newsreaders
v
t
e
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses.[5]
^"I2P Project Members". geti2p.net. Archived from the original on 26 February 2019. Retrieved 22 November 2015.
^I2P (project), Transifex, archived from the original on 2013-12-25, retrieved 2014-02-12.
^"Licenses", Get involved, Get I2P, archived from the original on 2013-12-24, retrieved 2013-12-24.
^Gallagher, Sean (2015-01-13). "Under the hood of I2P, the Tor alternative that reloaded Silk Road". Ars Technica. Archived from the original on 2019-07-12. Retrieved 2019-08-17.
an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses. I2P has been...
I2P runs an I2P router on their computer (node). The I2P router takes care of finding other peers and building anonymizing tunnels through them. I2P provides...
available on I2P and vice versa. It has a plugin that connects to the I2P network. If the user adds a torrent from I2P, it will be seeded on both I2P and the...
At times, it was both an onion service on the Tor network and an I2P node on I2P. After it was shut down in July 2017 following law enforcement action...
used it, despite the terminology being unofficial. Technology such as Tor, I2P, and Freenet are intended to defend digital rights by providing security...
and untraceable way. It is an open protocol and its java implementation (I2P-Bote) is free and open-source software, licensed under the GPLv3. As with...
have only two official mirrors of http://t.co/QVBbcAxzpz : http://btdigg.i2p (I2P) and http://t.co/MVMTk9mMre (TOR). Others are not ours" (Tweet). Archived...
platform-independent) I2P-Bote an anonymous, secure (end-to-end encrypted), serverless mail application with remailer functionality for the I2P network I2P-Messenger...
messages are bundled together. He called each message a "bulb", whereas I2P calls them "garlic cloves". All messages, each with their own delivery instructions...
Gadu-Gadu Google Talk (No longer available) I2P-Messenger (anonymous, end-to-end encrypted IM for the I2P network) ICQ (OSCAR) ICB IRC Line Mattermost...
network is the Invisible Internet Project (I2P). Unlike Tor, I2P is a fully internal network. The philosophy behind I2P is that each node routes traffic for...
commercial website on the dark web that operates via darknets such as Tor and I2P. They function primarily as black markets, selling or brokering transactions...
friend-to-friend networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the...
of routing. i2p provides a similar anonymity layer although in that case, one can only download torrents that have been uploaded to the i2p network. The...
rebuilt. Garlic routing is a variant of onion routing associated with the I2P network that encrypts multiple messages together, which both increases the...
This is different from peer-to-peer based anonymity networks like Tor and I2P, whose anonymization proxies are anonymous themselves, which means the users...
data. Examples of rendezvous protocols include JXTA, SIP, Freenet Project, I2P, and such protocols generally involve hole punching. Because of firewall...
other divisions of accounting in this structure are: invoice to payment (I2P), or P2P (Procure-to-pay) collect to cash (C2C), or O2C (Order to cash) manage...
network will recover itself by knitting the network around these "holes". I2P's implementation of Kademlia is modified to mitigate Kademlia's vulnerabilities...