Skip to content

I2P Invisible Network – Privacy Tool


What is I2P?

The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P.

I2P is an anonymous peer-to-peer distributed communication layer designed to run any traditional internet service (e.g. Usenet, E-mail, IRC, file sharing, Web hosting and HTTP, Telnet), as well as more traditional distributed applications (e.g. a distributed data store, a web proxy network using Squid, or DNS).

The I2P router is controlled through the router console which is a web frontend accessed through a web browser.

I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Possible uses include anonymous Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.

It’s Free and Cross Platform

The software is free and open source and is published under multiple licenses.

All communication is end-to-end encrypted  (in total there are four layers of encryption used when sending a message), and even the end points (“destinations”) are cryptographic identifiers (essentially a pair of public keys), so that neither sender nor recipient of a message need to reveal their IP address to the other side or to third-party observers.

Where can I find the developers?

Where can I download it? (Cross Platform)

In conclusion:

All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

  1. of course tor project is faster with better privacy . i recently find a new friend who introduced me a crazy writer who published most amazing technical document with unique features . all books are free and publisher allowed every one to republish them without change the content . among them is a book titled “practical digital self defense ” in two volumes with following links to download for free:

    practical digital self defense volume 1: offline security

    practical digital self defense volume 2: online security

    improvised wireless networking: long range WiFi based on mesh: independent internet structure


    • The only concerns I have are that:

      1. Tor is slow (compared to a VPN).

      2. Tor is not encrypted (a VPN is encrypted).

      If you have a choice – opt for a VPN – with the following rules

      1. Select a VPN outside of your country (ie not in the UK for me – so that a court order cannot be obtained on the VPN provider)

      2. That the VPN provider keeps no traffic or connection logs – or deletes the server logs within 24 hours (so that no court order can be obtained in time to get the server log).

      Until the EU can uphold European Data protection laws in Europe (against the Patriot Act and FISA) – use a VPN.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: