kids encyclopedia robot

I2P facts for kids

Kids Encyclopedia Facts
Quick facts for kids
I2P
I2P logo.svg
Original author(s) I2P Team
Initial release 2003; 22 years ago (2003)
Stable release
2.7.0 Edit this on Wikidata / 9 October 2024; 8 months ago (9 October 2024)
Written in Java
Operating system Cross-platform: Unix-like (Android, Linux, BSD, macOS), Microsoft Windows
Available in English, Spanish
Incomplete translations: Russian, French, Romanian, German, Swedish, Italian, Portuguese, Chinese, Dutch, Polish, Hungarian, Arabic, Japanese, Estonian, Persian
Type Anonymity application, Overlay network, mix network, garlic router, peer-to-peer
License Public domain, BSD, GPL, MIT (license varies by component)

The Invisible Internet Project (I2P) is a special network that helps people communicate online privately. It's like a secret layer on top of the regular internet. I2P makes it hard for anyone to watch what you're doing or where you are from.

It works by scrambling your internet traffic (using strong encryption) and sending it through a huge network of about 55,000 computers around the world. These computers are run by volunteers. Because there are so many possible paths your data can take, it's very difficult for someone to track your full connection.

The software that creates this secret network is called an "I2P router." A computer running I2P is called an "I2P node." I2P is free and open-source software, meaning anyone can use it and see how it works.

How I2P Works

I2P started in 2003. It's built to send messages securely, similar to how the internet sends data packets.

All communication on I2P is encrypted multiple times, like wrapping a gift in several layers. This process is called "garlic routing." Even the starting and ending points of messages are hidden using special codes. This means neither the sender nor the receiver needs to show their actual internet address to each other or to anyone watching.

I2P is designed to let you use many regular internet services, like email, chat, file sharing, and websites, but with added privacy. It can also run special private applications.

Many I2P developers use nicknames to protect their privacy. People like zzz, killyourtv, and Complication lead the development, with help from many others.

I2P uses very strong encryption methods to keep your data safe.

How I2P Gets Money

The I2P website says that all its money comes from donations. The project leaders say that the main I2P project itself doesn't take donations directly. Instead, they suggest donating to other apps that use I2P or to people who work on I2P.

The Open Technology Fund has also helped I2P get started. Unlike some other privacy networks, I2P doesn't have the money or legal setup to support "exit nodes" (which are special computers that connect private networks to the regular internet). The "reseed servers," which help new users connect to the I2P network, are run by volunteers.

What You Can Do with I2P

I2P router console 0.9.31-0
I2P 0.9.31-0 router console

I2P is a network layer, which means other software can use it for private communication. There are many tools available or being developed for I2P.

You control your I2P router through a "router console," which is a website you open in your web browser.

General Internet Use

  • I2PTunnel is a tool inside I2P that lets regular internet apps connect over I2P. It sets up "tunnels" that you can access from your computer.
  • SAM (Simple Anonymous Messaging) and BOB (Basic Open Bridge) are ways for other programs to talk to the I2P router.
  • Orchid is a plugin that connects I2P to the Tor network.
  • Since July 2024 (version 2.6.0), I2P no longer lets you access I2P through Tor connections.

Chatting

  • You can use many regular chat programs to connect to I2P's private chat servers. I2P can even filter out commands that might reveal your identity.
  • Some XMPP chat programs like Gajim or Pidgin can also work with I2P's XMPP servers.

Sharing Files

  • Several programs let you share files using BitTorrent over the I2P network. You can only connect to other I2P users for these files.
    • I2PSnark is a BitTorrent client that comes with I2P.
    • Vuze and BiglyBT are BitTorrent clients that have an I2P plugin for anonymous sharing.
    • Robert is another active BitTorrent client for I2P.
    • Postman is a torrent website within I2P that allows sharing of certain content.
  • iMule and Nachtblitz are programs for the Kad network within I2P, used for anonymous file sharing. iMule hasn't been updated since 2013.
  • I2Phex is a stable program for the Gnutella network on I2P.
  • Tahoe-LAFS lets you store files anonymously in special storage grids.
  • MuWire is a file-sharing program that works on I2P, but its development stopped in February 2023.

Connecting to the Regular Internet

Vuze and BiglyBT are the only torrent programs that can connect I2P torrents to the "clearnet" (the regular internet) and vice versa. This means you can download popular content from the internet anonymously through I2P.

Email

I2PBote-inbox-0.4
A screenshot of the inbox of I2P-Bote.
  • I2P-Bote is a free, decentralized, and anonymous email system. It focuses on security and doesn't reveal who you're emailing. It supports different identities and keeps your email details private. All emails are automatically encrypted and signed. You don't need to sign up for an account; just create a new identity.
  • I2P also has a free email service run by someone called Postman. Susimail is a web-based email program designed for use with Postman's servers, keeping your privacy in mind. It's included with I2P.
  • Bitmessage.ch can also be used over I2P.

Instant Messaging

  • I2P-Messenger is a simple chat program for I2P. It's serverless, meaning no central server logs your chats. Your internet provider can't see who you're chatting with or for how long. It also supports sending files.
  • I2P-Talk is another simple chat program with similar privacy features.

Publishing Content

  • Syndie is an app for sharing content like blogs, newsgroups, and forums. It's built to be strong and reliable. It can connect to I2P, Tor, Freenet, and the regular internet.
  • Aktie is an anonymous file-sharing and forum system. To stop spam, it makes you do a small computer task (called "hash payments") for every item you publish.

I2P Routers

  • i2pd is a lighter version of an I2P router written in a different computer language (C++). It doesn't include extra apps like email or torrents, but you can still use other I2P torrent clients with it.

The Privacy Solutions Project

The Privacy Solutions project is a group that works on I2P software. They are developing new tools to make I2P even more private and secure.

These include:

  • The Abscond browser bundle.
  • i2pd (the lighter I2P router).
  • The "BigBrother" project for monitoring the I2P network.

I2P on Android

I2PAndroid-console-0.9.20
I2P running on Android.
  • You can find I2P Router apps for Android on the Google Play store or on an F-Droid repository.
  • Nightweb was an Android app that used I2P and BitTorrent to share blog posts and photos. It is no longer being developed.

Cryptocurrencies

Some cryptocurrencies that work with I2P include:

Important I2P Words

Itoopie
I2P's mascot, itoopie, who is looking through a magnifying glass.
  • Eepsite: These are websites hosted privately within the I2P network. Their names usually end in .i2p, like forum.i2p. You typically need I2P to visit them.
  • .i2p: This is a special internet address ending that only works inside the I2P network. When you try to visit an .i2p site, I2P helps your browser find it and handles the data transfer privately.
  • EepProxy: This program acts like a middleman between your web browser and any eepsite. It makes sure all communication goes through the I2P network.
  • Peers, I2P nodes: These are other computers using I2P that are connected to your computer in the network. Each computer helps send encrypted data packets for others.
  • Tunnels: These are temporary connections created between your computer and other I2P peers. Your data, and data for other users, travels through these tunnels to its final destination.
  • netDb: This is a special database that holds information about I2P nodes and eepsites. It's spread out among many I2P routers. When you need to find an eepsite or more peers, your computer asks this database.

Keeping I2P Safe

Sometimes, websites on I2P can be attacked to make them unavailable. Site owners can take steps to protect their sites from some of these attacks.

In 2014, a hidden problem (called a "zero-day vulnerability") was found in I2P. This problem was used to figure out the real identity of at least 30,000 users. This issue was later fixed.

A study in 2017 looked at how investigators might find information from computers running I2P. It suggested that a seized computer might contain unencrypted data that could be helpful. It also mentioned a "trusted" I2P domain registrar ("NO.i2p") that seemed to be abandoned. The study suggested that this registrar could be a target for takeover or tricking the I2P community into using a fake replacement.

I2PCon

From August 15 to 16, 2015, an I2P convention called I2PCon was held in Toronto. It was hosted by a local hackerspace called Hacklab. The conference included talks from I2P developers and security experts.

Images for kids

See also

Kids robot.svg In Spanish: I2P para niños

kids search engine
I2P Facts for Kids. Kiddle Encyclopedia.