Mirror an existing site to the I2P Network https://www.youtube.com/watch?v=gaZ6RmDnzYY
The Invisible Internet Project. The I2P network is peer-to-peer and built for privacy and security by design. I2P official account. Find us also on @geti2p.bsky.social⬠Get I2P. #FOSS
Mirror an existing site to the I2P Network https://www.youtube.com/watch?v=gaZ6RmDnzYY
The I2P #Rust project looks very promising. Get involved - https://github.com/altonen/emissary
The real question isnβt whether to use advanced digital tools, but how: building private networks, resilient protocols, and secure channels. #divaexchange #privacy
https://www.diva.exchange/en/privacy/artificial-intelligence-as-a-threat-factor/
A complete guide to installing @i2p on your personal computer. Even a beginner will understand! Join the world of free internet. #divaexchange #i2p
I2P 2.10.0 Release : https://geti2p.net/en/blog/post/2025/09/08/2.10.0_release
The really bad age verification bill is back in Canada's Parliament https://youtu.be/cBJe3gB2Po4?si=kFSB2vC6hMdPuWYw&t=6
holy shit
"The Business Court in Brussels, Belgium, has issued an unprecedentedly broad site-blocking order that aims to restrict access to shadow libraries including Anna's Archive, Libgen, OceanofPDF, Z-Library, and the Internet Archive's Open Library. In addition to ISP blocks, the order also directs search engines, DNS resolvers, advertisers, domain name services, CDNs and hosting companies to take action. "
Iran: Proposed Cyber Bill Gives Authorities Sweeping New Powers to Block and Punish Online Content
Configuring Privacy Browser for I2P on Android https://eyedeekay.github.io/Configuring-Privacy-Browser-for-I2P-on-Android/
I2P asks to setup HTTPβ―proxy on the web browser, but are there reasons to use SOCKS instead ?
https://www.reddit.com/r/i2p/comments/1mbnfug/http_or_socks_proxy/
@DrRac27 @TronNerd82 As long as you always allow your router to let its network commitments expire on shutdown rather than terminating connections with a hard shutdown it is fine. It terms of how routers participate in the network database, https://geti2p.net/en/docs/how/network-database explains how data and entries are handled and distribution methodology.
π§ π I2P uses garlic routing, bundling and encryption in three places:
1. For building and routing through tunnels (layered encryption).
2. For determining the success or failure of end to end message delivery (bundling)
3. For publishing some network database entries (dampening the probability of a successful traffic analysis attack)
@i2p That's why I start up I2P on my laptop every day, even if I'm not gonna use I2P that day. Gotta contribute as best I can.
Eventually, I'll get around to building a desktop, where I'll be sure to keep I2P up and running for longer stretches of time, but I'm working with what I got.
Thanks for being the best anonymizing network around! :3
Every participant in the I2P network is a peer / node. This means that everyone participates in routing traffic. It also means that the greater amount of peers, the better the network functions resulting in better connectivity, and also increased traffic protection.
How is I2P network traffic protected from potential observers?
The server is hidden from the user and the user from the server. All I2P network traffic is internal to its network.
Encrypted unidirectional tunnels are used between peers to send traffic. No one can see where that traffic is coming from, where it is going, or what the contents are. I2P transports also offer resistance to pattern recognition and blocking by censors.
All traffic on the I2P network is encrypted. An observer cannot see message contents, source, or destination. All traffic you route as a participant is internal to the I2P network, you are not an exit node.
I2P FAQ:
I Can See My IP Address!
Yes, this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. While the fact that your computer runs I2P software is public, nobody can see your activities in the network. For instance, you cannot see if a user behind an IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the network.
I am regularly told that people stumbled on my work via my site's #i2p mirror. The 'regular web' may be dead, but I am convinced that darknets are alive and well with people actually browsing the web.
This surprises me because I have no idea how they're finding my site via I2P...