This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate? Excessive Violence Sexual Content Political / Social
Email Address:
Article Id: WHEBN0000538434 Reproduction Date:
The Invisible Internet Project (I2P) is an overlay network and darknet that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P.
I2P is beta software since 2003.[6] Developers emphasize that there are likely to be bugs in the software and that there has been insufficient peer review to date.[7] However, they believe the code is now reasonably stable and well-developed, and more exposure can help development of I2P.
The network itself is strictly message-based (like IP), but there is a library available to allow reliable streaming communication on top of it (similar to TCP, although from version 0.6 there is a new UDP-based SSU transport). All communication is end-to-end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys), so that neither sender nor recipient of a message need to reveal their IP address to the other side or to third-party observers.
Although many developers had been a part of the Invisible IRC Project (IIP)[8] and Freenet communities, there are significant differences between their designs and concepts. IIP was an anonymous centralized IRC server. Freenet is a censorship-resistant distributed data store. I2P is an anonymous peer-to-peer distributed communication layer designed to run any traditional internet service (e.g. Usenet, email, IRC, file sharing, Web hosting and HTTP, Telnet), as well as more traditional distributed applications (e.g. a distributed data store, a web proxy network using Squid, or DNS).
Many developers of I2P are known only under pseudonyms. While the previous main developer, jrandom, is currently on hiatus, others, such as zzz, killyourtv, and Complication have continued to lead development efforts, and are assisted by numerous contributors.[1]
I2P has had a stable release every six to eight weeks.
Since I2P is an anonymous network layer, it is designed so other software can use it for anonymous communication. As such there are a variety of tools currently available for I2P or in development.
The I2P router is controlled through the router console which is a web frontend accessed through a web browser.
The Privacy Solutions project,[33] a new organization that develops and maintains I2P software, launched several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.
These efforts include:[34]
The code repository and download sections for the i2pd and Abscond project is available for the public to review and download.[35]
Current crypto currencies that support I2P, or plan it are listed bellow.
From August 15, 2015 to August 16, 2015 the first I2P convention was held in Toronto, Ontario.[45] The conference was hosted by a local hackerspace, Hacklab. The conference featured presentations from I2P developers security researchers.
August 15, 2015 mainly had presentations on the past growth of the i2p network, a talk on what happens when companies sell your personal information, and a round-table discussion on general privacy and security topics. The day ended with a CryptoParty which helped to introduce new users to installing I2P, sending secure emails with I2P-Bote, and using I2P along with Vuze.
August 16, 2015 had more technical discussions than the previous day. The talks focused what how to dissuade bad-actors from using the network, how I2P has worked computer connection limits, how to do application development using I2P, and on the development of the Android version. This day ended with a development meeting.
Software :
Electronic Frontier Foundation, Os X, Instant messaging, I2p, Linux
Instant messaging, Freenode, Unix, Transport Layer Security, Transmission Control Protocol
Gnutella, The Pirate Bay, United States, Digital Millennium Copyright Act, Malware
Proprietary software, Gnutella2, LimeWire, I2p, Gnu
I2p, Tor (anonymity network), Freenet, Gnutella, BitTorrent
I2p, Tor (anonymity network), Microsoft Windows, Garlic, Onion routing
Tor (anonymity network), I2p, Java (programming language), Software, World Wide Web
I2p, Python (programming language), Cloud computing, Free software, Raid