I2P πŸ”΄ 🟑 🟒

The Invisible Internet Project. The I2P network is peer-to-peer and built for privacy and security by design. I2P official account. Find us also on @geti2p.bsky.social‬ Get I2P.

I2P πŸ”΄ 🟑 🟒 boosted:
Sadie Mascis πŸŒ’sadiedoreen
2025-12-24

Mirror an existing site to the I2P Network youtube.com/watch?v=gaZ6RmDnzYY

I2P πŸ”΄ 🟑 🟒 boosted:
Sadie Mascis πŸŒ’sadiedoreen
2025-12-22
I2P πŸ”΄ 🟑 🟒 boosted:
Adam - K3CANme@social.k3can.us
2025-12-22

I noticed today that #FreshRSS supports http proxies for #RSS feeds... Meaning I can point it to my #I2P proxy and pull #darkweb rss feeds into my usual readers!

I2P πŸ”΄ 🟑 🟒i2p
2025-11-24

The I2P project looks very promising. Get involved - github.com/altonen/emissary

I2P πŸ”΄ 🟑 🟒 boosted:
2025-11-23

The real question isn’t whether to use advanced digital tools, but how: building private networks, resilient protocols, and secure channels. #divaexchange #privacy

diva.exchange/en/privacy/artif

I2P πŸ”΄ 🟑 🟒 boosted:
2025-11-23

A complete guide to installing @i2p on your personal computer. Even a beginner will understand! Join the world of free internet. #divaexchange #i2p

diva.exchange/en/privacy/how-t

I2P πŸ”΄ 🟑 🟒i2p
2025-09-15
I2P πŸ”΄ 🟑 🟒i2p
2025-08-01

The really bad age verification bill is back in Canada's Parliament youtu.be/cBJe3gB2Po4?si=kFSB2v

I2P πŸ”΄ 🟑 🟒 boosted:
2025-08-01

holy shit

"The Business Court in Brussels, Belgium, has issued an unprecedentedly broad site-blocking order that aims to restrict access to shadow libraries including Anna's Archive, Libgen, OceanofPDF, Z-Library, and the Internet Archive's Open Library. In addition to ISP blocks, the order also directs search engines, DNS resolvers, advertisers, domain name services, CDNs and hosting companies to take action. "

#lawfedi

torrentfreak.com/belgium-bans-

I2P πŸ”΄ 🟑 🟒i2p
2025-07-31

Iran: Proposed Cyber Bill Gives Authorities Sweeping New Powers to Block and Punish Online Content

iranhumanrights.org/2025/07/ir

I2P πŸ”΄ 🟑 🟒i2p
2025-07-29
I2P πŸ”΄ 🟑 🟒i2p
2025-07-29

I2P asks to setup HTTPβ€―proxy on the web browser, but are there reasons to use SOCKS instead ?

reddit.com/r/i2p/comments/1mbn

I2P πŸ”΄ 🟑 🟒i2p
2025-07-29

@DrRac27 @TronNerd82 As long as you always allow your router to let its network commitments expire on shutdown rather than terminating connections with a hard shutdown it is fine. It terms of how routers participate in the network database, geti2p.net/en/docs/how/network explains how data and entries are handled and distribution methodology.

I2P πŸ”΄ 🟑 🟒i2p
2025-07-28

πŸ§„ πŸ”’ I2P uses garlic routing, bundling and encryption in three places:
1. For building and routing through tunnels (layered encryption).
2. For determining the success or failure of end to end message delivery (bundling)
3. For publishing some network database entries (dampening the probability of a successful traffic analysis attack)

I2P πŸ”΄ 🟑 🟒 boosted:
TronNerd82TronNerd82
2025-07-28

@i2p That's why I start up I2P on my laptop every day, even if I'm not gonna use I2P that day. Gotta contribute as best I can.

Eventually, I'll get around to building a desktop, where I'll be sure to keep I2P up and running for longer stretches of time, but I'm working with what I got.

Thanks for being the best anonymizing network around! :3

I2P πŸ”΄ 🟑 🟒i2p
2025-07-28

Every participant in the I2P network is a peer / node. This means that everyone participates in routing traffic. It also means that the greater amount of peers, the better the network functions resulting in better connectivity, and also increased traffic protection.

I2P πŸ”΄ 🟑 🟒i2p
2025-07-28

How is I2P network traffic protected from potential observers?

The server is hidden from the user and the user from the server. All I2P network traffic is internal to its network.
Encrypted unidirectional tunnels are used between peers to send traffic. No one can see where that traffic is coming from, where it is going, or what the contents are. I2P transports also offer resistance to pattern recognition and blocking by censors.

I2P πŸ”΄ 🟑 🟒i2p
2025-07-28

All traffic on the I2P network is encrypted. An observer cannot see message contents, source, or destination. All traffic you route as a participant is internal to the I2P network, you are not an exit node.

I2P πŸ”΄ 🟑 🟒i2p
2025-07-28

I2P FAQ:
I Can See My IP Address!

Yes, this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. While the fact that your computer runs I2P software is public, nobody can see your activities in the network. For instance, you cannot see if a user behind an IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the network.

I2P πŸ”΄ 🟑 🟒 boosted:
2025-07-17

I am regularly told that people stumbled on my work via my site's #i2p mirror. The 'regular web' may be dead, but I am convinced that darknets are alive and well with people actually browsing the web.
This surprises me because I have no idea how they're finding my site via I2P...

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst