I2P Invisible Network – Privacy Tool
What is I2P?
The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P.
I2P is an anonymous peer-to-peer distributed communication layer designed to run any traditional internet service (e.g. Usenet, E-mail, IRC, file sharing, Web hosting and HTTP, Telnet), as well as more traditional distributed applications (e.g. a distributed data store, a web proxy network using Squid, or DNS).
The I2P router is controlled through the router console which is a web frontend accessed through a web browser.
I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Possible uses include anonymous Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
It’s Free and Cross Platform
All communication is end-to-end encrypted (in total there are four layers of encryption used when sending a message), and even the end points (“destinations”) are cryptographic identifiers (essentially a pair of public keys), so that neither sender nor recipient of a message need to reveal their IP address to the other side or to third-party observers.
Where can I find the developers?
Where can I download it? (Cross Platform)
All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.