I think this article is generated by AI.
Fake CVE numbers. For example, "critical vulnerability (CVE-2021-34527) revealed that Tor Browser leaked real IPs under certain configurations", but if you look it up, it is about Windows Print Spooler.
I2P sites also look fake.
The debian package is called i2pd
, not purplei2p
@silverpill >Developers in China use it to distribute tools and circumvent the Great Firewall.
Tbh, Chinese developers typically use shadowsocks or vmess protocol proxies; they do not use i2p. Futhermore, no one in China knows about i2p, even though its usability is better than Tor.
This is a very good write-up. I have found I2P to be rather slow when I've tried to play with it, and I don't know if that's a misconfiguration on my part, or if I2P would benefit from something like the proof-of-work defenses that Tor has implemented, which have made hidden services work much more reliably. I'm obviously aware that any overlay network is going to be slower than the main internet. But, at least on my system, I found I2P to be even slower than Tor, which I was not expecting.
Also, I would consider myself to be a fairly technical user, and I2P even seems a bit daunting for me. I think one thing that makes Tor so well used is the fact that Tor browser exists where it's already pre-configured to just work as soon as you open it. I currently even host my Monero node as a Tor hidden service with the proof of work defenses enabled and a couple of other hidden onion services for my home assistant setup.
Edit: With even supposedly democratic Western governments beginning to censor the internet, I am thinking very seriously that at some point it may be required to use Tor and I2P to actually access useful information on the internet and that there will be a bifurcation of the internet into those who know and those who don't.
Currently i use my podcast app (AntennaPod), F-Droid, several Monero wallets, Molly (signal fork), and SimpleX all over the tor SOCKS5. I don't have any reason to do so except to generate cover traffic for those who are using it for more necessary purposes and to understand how the networks operate as far as bandwidth, etc., are concerned.
Every time it is possible to access anything as a hidden service, I will do so. I have my F-Droid repos, for example, using their hidden service equivalents instead of the clearnet ones. Just because I can. And I love having F-Droid repositories that are hidden services only.
Edit 2: It took me 31 minutes to pull 51 megabytes of data to synchronize my Monero wallet over an i2p hs. An onion tor hs would have had that done several times over in that time
I haven't looked at the article yet and only superficially poked around with I2P, but I think the idea is that user adoption is the key to better speeds and reliability given the P2P nature. That said, I found it to be daunting as well just getting into it.
Privacy and security in general are like that for me because a lot of the pitfalls come with how you use the tech and not just the structures they provide.
I think 300KB/s is around the max possible in the current implementation:
Encryption, latency, and how a tunnel is built makes it quite expensive in CPU time to build a tunnel. This is why a destination is only allowed to have a maximum of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available). Used tunnels are discarded every 10 minutes and new ones are built. This change of tunnels, and sometimes clients that shutdown or lose their connection to the network will sometimes break tunnels and connections. An example of this can be seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget.
The Invisible Internet Project
I2P Community Edition
This isn't the official I2P channel, if you want go there then you can find it in the links below.
Rules
- Be nice and friendly
- Don't spam
- No darknet markets
- No malicious content
- No closed source software
- No excessive self promotion
- No violence or hate speech
- I2P related posts only
- Please use English
- No illegal file sharing
- Lemmy rules also apply here
- No crypto-currency
"Don't be a dick" - Wil Wheaton
General
-
I2P Forum (clearnet) Official I2P community and development forum
-
zzz zzz's personal website, old developers forum
-
planet.i2p RSS aggregator
Media:
- Incogtube - Youtube front end
File Hosting and Pastebins
-
FS Filesharing service
-
Cake Pastebin short term filesharing and pastebin
-
PrivateBin Encrypted pastebin
-
IDK's CowYo pastebin, Mirror (Requires JS)
Torrents
-
PaTracker Main torrent tracker
-
Chudo's Torrents (French) torrent tracker
Social Networks and Microblogging
Exploring I2P
- Notbob List online .i2p sites and categorizes them
I2P Name Registries
-
reg.i2p operated by PurpleI2P Team
-
isitup.i2p Another I2P Name Registry and checking tools to see if a eepsite is offline.
Search engines
IRC
Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.
- Irc2P (works out of the box)
Syndie
An open source system for operating distributed forums in anonymous networks
-
Syndie Project Syndie Project Website
-
syndie.darrob.i2p
-
syndie.echelon.i2p
-
syndie.inscrutable.i2p
-
syndie.killyourtv.i2p
-
syndie.meeh.i2p
-
syndie.welterde.i2p
Inproxies
You can use inproxies to surf the I2P network without having to have an I2P router.
-
i2phides.me / i2p.mk16.de (i2p-inproxy.mk16.de)
-
onion.ly
Follow us on Twitter