Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

I2P

From Wikipedia, the free encyclopedia
Free and open source project building an anonymous network
This articlerelies excessively onreferences toprimary sources. Please improve this article by addingsecondary or tertiary sources.
Find sources: "I2P" – news ·newspapers ·books ·scholar ·JSTOR
(August 2017) (Learn how and when to remove this message)
Original author(s)I2P Team[1]
Initial release2003; 22 years ago (2003)
Stable release
2.8.0[2] Edit this on Wikidata / 4 February 2025; 41 days ago (4 February 2025)
Repository
Written inJava
Operating systemCross-platform:Unix-like (Android,Linux,BSD,macOS),Microsoft Windows
Available inEnglish, Spanish
Incomplete translations: Russian, French, Romanian, German, Swedish, Italian, Portuguese, Chinese, Dutch, Polish, Hungarian, Arabic, Japanese, Estonian, Persian[3]
TypeAnonymity application,Overlay network,mix network,garlic router,peer-to-peer
LicensePublic domain,BSD,GPL,MIT (license varies by component)[4]
Websitegeti2p.net
Part ofa series on
File sharing
Development and societal aspects
By country or region

TheInvisible Internet Project (I2P) is an anonymous network layer (implemented as amix network) that allows forcensorship-resistant,peer-to-peer communication. Anonymous connections are achieved byencrypting the user's traffic (by usingend-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P isfree andopen source, and is published under multiplelicenses.[5]

Technical design

[edit]

I2P started in 2003 as a fork ofFreenet.[6][7]

The network is strictly message-based, likeIP, but alibrary is available to allow reliablestreaming communication on top of it (similar toNon-blocking IO-basedTCP, although from version 0.6, a newSecure Semi-reliableUDP transport is used[8]). All communication isend-to-end encrypted (in total, four layers of encryption are used when sending a message) throughgarlic routing,[9] and even theend points ("destinations") arecryptographic identifiers (essentially a pair ofpublic keys), so that neither senders nor recipients of messages need to reveal theirIP address to the other side or to third-party observers.

Although many developers had been a part of the Invisible IRC Project (IIP)[10] andFreenet communities, significant differences exist between their designs and concepts. IIP was an anonymous centralizedIRC server. Freenet is acensorship-resistantdistributed data store. I2P is ananonymous peer-to-peer distributed communication layer designed to runany traditional internet service (e.g.Usenet,email,IRC,file sharing,Web hosting andHTTP, orTelnet), as well as more traditional distributed applications (e.g. a distributed data store, aweb proxy network usingSquid, orDNS).

Many developers of I2P are known only underpseudonyms. While the previous main developer,jrandom, is currently on hiatus,[11] others, such aszzz,killyourtv, andComplication have continued to lead development efforts,[citation needed] and are assisted by numerous contributors.[1]

I2P uses 2048bitElGamal/AES256/SHA256+Session Tags encryption[12] andEd25519EdDSA/ECDSAsignatures.[13]

Releases

[edit]
This section needs to beupdated. Please help update this article to reflect recent events or newly available information.
Last update: v1.6.1 - 2021-11-29
(May 2024)

I2P has had a stable release every six to eight weeks. Updates are distributed via I2P torrents and are signed by the release manager (generallyzzz orstr4d).

I2P Versions
VersionRelease dateRelease notes
Old version, not maintained: 0.9.112014-02-08Support for outproxy plugins, improves lease set lookup security, and reduces memory usage.[14]
Old version, not maintained: 0.9.122014-03-31Support forECDSA and updates toJetty 8.[15]
Old version, not maintained: 0.9.132014-05-22SusiMail improvements and fixes for firewalled router.[16]
Old version, not maintained: 0.9.142014-07-26Critical fixes forXSS and remote execution vulnerabilities.[17]
Old version, not maintained: 0.9.14.12014-08-09I2PSnark and console fixes.[18]
Old version, not maintained: 0.9.152014-09-20Preliminary support for Ed25519EdDSA signatures.[19]
Old version, not maintained: 0.9.162014-11-01Add support for stronger Router Info signatures.[20]
Old version, not maintained: 0.9.172014-11-30Signed news, ECDSA tunnels by default.[21]
Old version, not maintained: 0.9.182015-02-22Shortened the startup time, and reduced latency throughout our network protocols.[22]
Old version, not maintained: 0.9.192015-04-12Several fixes and improvements for floodfill performance.[23]
Old version, not maintained: 0.9.202015-06-02Important bug fixes, and several changes to increase floodfill capacity in the network.[24]
Old version, not maintained: 0.9.212015-07-31Contains several changes to add capacity to the network, increase the efficiency of the floodfills, and use bandwidth more effectively.[25]
Old version, not maintained: 0.9.222015-09-12Fixes for I2PSnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.[26]
Old version, not maintained: 0.9.232015-11-19Accelerates the rekeying process.[27]
Old version, not maintained: 0.9.242016-01-27A new version of SAM (v3.2) and numerous bug fixes and efficiency improvements. The first release to require Java 7.[28]
Old version, not maintained: 0.9.252016-03-22A new version of SAM (v3.3), QR codes for sharing hidden services, identicons and router families.[29]
Old version, not maintained: 0.9.262016-06-07Major upgrade to the native crypto library, a new addressbook subscription protocol with signatures, and major improvements to the Debian/Ubuntu packaging.[30]
Old version, not maintained: 0.9.272016-10-17Improvements in IPv6 transports, SSU peer testing, and hidden mode.[31]
Old version, not maintained: 0.9.282016-12-12Updates for a number of bundled software, fixes for IPv6 peer testing, improvements to detect and block potentially malicious peers. Preliminary fixes for Java 9.[32]
Old version, not maintained: 0.9.292017-02-27Support for NTP over IPv6, preliminary Docker support, translated main pages. We now pass same-origin Referrer headers through the HTTP proxy. There are more fixes for Java 9, although we do not yet recommend Java 9 for general use.[33]
Old version, not maintained: 0.9.302017-05-03Support for Debian Stretch and Ubuntu Zesty, upgraded to Jetty 9 and Tomcat 8, support for the migration of old DSA-SHA1 hidden services to the EdDSA signature type.[34]
Old version, not maintained: 0.9.312017-08-07Refreshed the router console to improve readability, improved accessibility and cross-browser support, and general tidying up.[35]
Old version, not maintained: 0.9.322017-11-070.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail). We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS. Added some checks in the console to resist rebinding attacks.[36]
Old version, not maintained: 0.9.332018-01-300.9.33 contains bug fixes for i2psnark, i2ptunnel, streaming, and SusiMail. Updates for reseed proxying, and default rate limiting.[37]
Old version, not maintained: 0.9.342018-04-100.9.34 contains bug fixes for i2ptunnel, router console, SusiMail, routing and transport along with Changes to SusiMail and UPnP.[38]
Old version, not maintained: 0.9.352018-06-260.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.[39]
Old version, not maintained: 0.9.362018-08-230.9.36 implements a new, more secure transport protocol called NTCP2. It is disabled by default, but you may enable it for testing. NTCP2 will be enabled in the next release.[40]
Old version, not maintained: 0.9.372018-10-040.9.37 enables the faster, more secure transport protocol called NTCP2.[41]
Old version, not maintained: 0.9.382019-01-220.9.38 includes a new first-install wizard with a bandwidth tester. We've added support for the latest GeoIP database format. There's a new Firefox profile installer and a new, native Mac OSX installer on our website. Work continues on supporting the new "LS2" netdb format.[42]
Old version, not maintained: 0.9.392019-03-210.9.39 includes extensive changes for the new network database types (proposal 123). We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications. There are numerous performance improvements and bug fixes.[43]
Old version, not maintained: 0.9.402019-05-070.9.40 includes support for the new encrypted leaseset format. We disabled the old NTCP 1 transport protocol. There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections.[44]
Old version, not maintained: 0.9.412019-07-020.9.41 continues the work to implement new features for proposal 123, including per-client authentication for encrypted leasesets. The console has an updated I2P logo and several new icons. We've updated the Linux installer.[45]
Old version, not maintained: 0.9.422019-08-280.9.42 continues the work to make I2P faster and more reliable. It includes several changes to speed up our UDP transport. We have split up the configuration files to enable future work for more modular packaging. We continue work to implement new proposals for faster and more secure encryption. There are, of course, a lot of bug fixes also.[46]
Old version, not maintained: 0.9.432019-10-220.9.43 release continues work on stronger security and privacy features and performance improvements. Our implementation of the new leaseset specification (LS2) is now complete. We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release. Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes.[47]
Old version, not maintained: 0.9.442019-12-010.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.[48]
Old version, not maintained: 0.9.452020-02-250.9.45 contains bug fixes.[49]
Old version, not maintained: 0.9.462020-05-250.9.46 contains new ECIES Encryption.[50]
Old version, not maintained: 0.9.472020-08-240.9.47 enables new encryption for some services, now requires Java 8 and Sybil analysis and blocking is now enabled by default.[51]
Old version, not maintained: 0.9.482020-11-300.9.48 enables new encryption for most services, has significant performance improvements.[52]
Old version, not maintained: 0.9.492021-02-170.9.49 improves SSU transport and begins transition toX25519 encryption for routers.[53]
Old version, not maintained: 0.9.502021-05-170.9.50 continues transition to X25519 encryption for routers, enablesDoH for reseeding and improves support for IPv6.[54]
Old version, not maintained: 1.5.02021-08-231.5.0 adds short tunnel build messages, continues transition to X25519 encryption for routers and improves performance.[55]
Latest version:1.6.1[56]2021-11-291.6.1 further accelerates transition to X25519 for routers, enables short tunnel build messages and improves SSU performance.[57]
Legend:
Old version, not maintained
Old version, still maintained
Latest version
Latest preview version
Future version

Funding

[edit]

The website states that "funding for I2P comes entirely from donations".[58] Admins and managers of the project said that "the core project itself doesn't take donations". These should instead go to secondary applications or be spent on hiring others, to work on I2P.[59] Support for theonboarding for I2P came from theOpen Technology Fund.[60][61] In contrast toThe Tor Project, I2P has "not the financial or legal infrastructure to support a network ofexit nodes".[62] The reseed servers,[63] a sort of bootstrap nodes,[64] which connect the user with the initial set of peers to join the I2P-network, should be run by volunteers.[65]

Software

[edit]
I2P 0.9.31-0 router console

Since I2P is an anonymizingnetwork layer, it is designed so other software can use it for anonymous communication. As such, there are a variety of tools currently available for I2P or in development.

The I2Prouter is controlled through the router console, which is a web frontend accessed through a web browser.

General networking

[edit]
  • I2PTunnel is an application embedded into I2P that allows arbitrary TCP/IP applications to communicate over I2P by setting up "tunnels" which can be accessed by connecting to pre-determined ports onlocalhost.
  • SAM (Simple Anonymous Messaging) is aprotocol which allows a client application written in anyprogramming language to communicate over I2P, by using a socket-based interface to the I2P router.[66]
  • BOB (Basic Open Bridge) is a less complex app to router protocol similar to "SAM"[67]
  • Orchid OutproxyTor plugin[68]
  • As of version 2.6.0, released in July 2024, I2P no longer allows I2P access over Tor connections.[69]

Chat

[edit]
  • AnyIRC client made for the Internet Relay Chat can work, once connected to the I2PIRC server (on localhost). I2P have the option to create tunnels that are specific for this usage, where certain commands that could de-anonymize the user are filtered out.
  • SomeXMPP clients likeGajim,Pidgin or a modifiedConversations client[70] can work with I2P XMPP servers usingProsody that are using the mod_darknet module[71]

File sharing

[edit]
  • Several programs provideBitTorrent functionality for use within the I2P network. Users cannot connect to non-I2P torrents or peers from within I2P, nor can they connect to I2P torrents or peers from outside I2P.[72]I2PSnark, included in the I2P install package, is a port of the BitTorrent client named Snark.[73]Vuze, formerly known as Azureus, is aBitTorrent client that includes a plugin for I2P, allowing anonymous swarming through this network.[74] This plugin is still in an early stage of development, however it is already fairly stable.I2P-BT is a BitTorrent client for I2P that allows anonymous swarming forfile sharing. This client is a modified version of the original BitTorrent 3.4.2 program which runs onMS Windows and most dialects ofUnix in a GUI and command-line environment. It was developed by the individual known as 'duck' on I2P in cooperation with 'smeghead'. It is no longer being actively developed; however, there is a small effort to upgrade the I2P-BT client up to par with the BitTorrent 4.0 release.I2PRufus is an I2P port of the Rufus BitTorrent client.[75]Robert (P2P Software) is the most actively maintained I2PRufus fork. XD is a standalone BitTorrent client written in Go.[76] BiglyBT is a bittorrent client based on Vuze which also allows the use of i2p for downloading/seeding. Additionally, there exists a torrent index namedPostman, ran by the individual with the same name, its rules says that it does not allow illegal content, butwarez andpiracy is accepted.
  • TwoKad network clients exist for the I2P network,iMule andNachtblitz. iMule (invisible Mule) is a port ofeMule for I2P network. iMule has not been developed since 2013. iMule is made for anonymous file sharing. In contrast to othereDonkey clients, iMule only uses theKademlia for proceeding to connect through I2P network, so no servers are needed.Nachtblitz[77] is a custom client built on the .NET Framework. The latest version is 1.4.27, released on March 23, 2016. Nachtblitz includes a time lock to disable the software one year after its release date.
  • I2Phex is a port of the popularGnutella clientPhex to I2P. It is stable and fairly functional.
  • Tahoe-LAFS has been ported to I2P. This allows for files to be anonymously stored in Tahoe-LAFS grids.
  • MuWire is a file-sharing program inspired by the LimeWire Gnutella client that works atop the I2P network.[78]

Bridging to clearnet

[edit]

Currently,Vuze and BiglyBT are the torrent clients that makeclearnet (connections not through I2P) torrents available on I2P and vice versa. Depending on the client settings, torrents from the internet can be made available on I2P (via announcements to I2P's DHT network) and torrents from I2P can be made available to the internet. For this reason, torrents previously published only on I2P can be made available to the entire Internet, and users of I2P can often download popular content from the Internet while maintaining the anonymity of I2P. As of August 2022, the default outproxy is exit.stormycloud.i2p which is run by StormyCloud Inc.[79][80][81]

Email

[edit]
This sectiondoes notcite anysources. Please helpimprove this section byadding citations to reliable sources. Unsourced material may be challenged andremoved.(February 2024) (Learn how and when to remove this message)
A screenshot of the inbox of I2P-Bote.
  • I2P-Bote is afree, fullydecentralized and distributed anonymousemail system with a strong focus on security.[82] It supports multiple identities and does not expose emailmetadata. As of 2015[update], it is still consideredbeta software. I2P-Bote is accessible via the I2Pweb console interface or using standard email protocols (i.e.IMAP/SMTP). All bote-mails are transparently end-to-end encrypted and signed by the sender's private key, thus removing the need forPGP or other email encryption software. I2P-Bote offers additional anonymity by allowing for the use of mail relays with variable length delays. Since it is decentralized, there is no centralized email server that could correlate different email identities as communicating with each other (i.e.profiling). Even thenodes relaying the mails do not know the sender, and apart from sender and receiver, only the end of the high-latency mail route and the storing nodes will know to whom (which I2P-Bote address – the user's IP address is still hidden by I2P) the mail is destined. The original sender could have gone offline long before the email becomes available to the recipient. No account registration is necessary, all you have to do in order to use it is create a new identity. I2P-Bote can be installed as an I2P plugin .[83]
  • I2P also has a free pseudonymous e-mail service run by an individual calledPostman. Susimail is aweb-based email client intended primarily for use with Postman's mail servers, and is designed with security and anonymity in mind. Susimail was created to address privacy concerns in using these servers directly using traditional email clients, such as leaking the user's hostname while communicating with the SMTP server. It is currently included in the default I2P distribution, and can be accessed through the I2P router console web interface. Mail.i2p can contact both I2P email users and public internet email users.
  • Bitmessage.ch can be used over I2P[citation needed]

Instant messaging

[edit]
  • I2P-Messenger is a simpleQt-based, serverless,end-to-end-encryptedinstant messenger for I2P.[84] No servers can log the user's conversations. No ISP can log with whom the user chats, when, or for how long. As it is serverless, it can make use of I2P's end-to-end encryption, preventing any node between two parties from having access to the plain text. I2P-Messenger can be used for fully anonymous instant communication with persons the user doesn't even know, or, alternatively, to communicate securely and untraceably with friends, family members, or colleagues. In addition to messaging,file transfer is also supported.
  • I2P-Talk is another simple instant messenger incompatible with I2P-Messenger, but having the same security properties

Publishing

[edit]
  • Syndie is a content distribution application, suitable forblogs,newsgroups,forums and small media attachments. Syndie is designed fornetwork resilience. It supports connections to I2P, the Tor network (Syndie does not support Socks proxies, workaround needed for Tor access), Freenet and the regular internet. Server connections are intermittent, and supporthigher-latency communications. Connections can be made to any number of known servers. Content is spread efficiently using aGossip protocol.
  • Aktie is an anonymous file sharing and distributedweb of trust forums system. Aktie can connect to I2P with its internal router or use an external router. To fight spam, "hash payments" (proof of CPU work) is computed for every published item.

Routers

[edit]
[icon]
This sectionneeds expansion with: i2pd. You can help byadding to it. Relevant discussion may be found onTalk:I2P.(May 2024)
  • i2pd is a light-weight I2P router written inC++, stripping the excessive applications such as e-mail, torrents, and others that can be regarded as bloat.[85][86] The I2PSnark standaloneBitTorrent client by I2P+ Team can still be used with it.

The Privacy Solutions project

[edit]

The Privacy Solutions project,[87] a new organization that develops and maintains I2P software, launched several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.

These efforts include:[88]

  • The Abscond browser bundle.
  • i2pd,[89] an alternate implementation of I2P, written in C++ (rather than Java).
  • The "BigBrother" I2Pnetwork monitoring project.

The code repository and download sections for the i2pd and Abscond project is available for the public to review and download.[90]Effective January, 2015 i2pd is operating under PurpleI2P.[91]

Android

[edit]
I2P running onAndroid.
  • Release builds of an I2P Router application for Android can be found on theGoogle Play store under The Privacy Solutions Project's Google Play account or on anF-Droid repository hosted by the developers.[92]
  • Nightweb is an Android application that utilizes I2P and Bittorrent to share blog posts, photos, and other similar content. It can also be run as a desktop application. It is no longer in development.[93]

Cryptocurrency

[edit]

Some cryptocurrencies that support I2P are listed below.

Terminology

[edit]
I2P's mascot, itoopie, who is looking through a magnifying glass.[95]
Eepsite
Eepsites arewebsites that are hosted anonymously within the I2P network. Eepsite names end in.i2p, such asugha.i2p orforum.i2p. EepProxy can locate these sites through thecryptographic identifier keys stored in thehosts.txt file found within the I2P program directory. Typically, I2P is required to access these eepsites.[96]
.i2p
'I2p' is apseudo-top-level domain which is only valid within the I2Poverlay network scope..i2pnames are resolved by browsers by submitting requests to EepProxy which will resolve names to an I2P peer key and will handle data transfers over the I2P network while remaining transparent to the browser.[97]
EepProxy
The EepProxy program handles all communication between the browser and any eepsite. It functions as aproxy server that can be used by anyweb browser.
Peers, I2P nodes
Other machines using I2P that are connected to user's machine within the network. Each machine within the network shares the routing and forwarding of encryptedpackets.
Tunnels
Every ten minutes, a connection is established between the user's machine and another peer. Data to and from the user, along with the data for other peers (routed through the user's machine), pass through these tunnels and are forwarded to their final destination (may include morejumps).[98]
netDb
Thedistributed hash table (DHT)database based on theKademliaalgorithm that holds information on I2P nodes and I2P eepsites. This database is split up among routers known as "floodfill routers". When a user wants to know how to contact an eepsite, or where more peers are, they query thedatabase.[99][96]

Vulnerabilities

[edit]

Denial of service attacks are possible against websites hosted on the network, though a site operator may secure their site against certain versions of this type of attack to some extent.[100][101]

Azero-day vulnerability was discovered for I2P in 2014, and was exploited tode-anonymize at least 30,000 users. This included users of the operating systemTails.[102] This vulnerability was later patched.[103][104]

A 2017 study examining howforensic investigators might exploit vulnerabilities in I2P software to gather useful evidence indicated that a seized machine which had been running I2P router software may hold unencrypted local data that could be useful tolaw enforcement. Records of which websites a user of a later-seized machine was interested in may also be inferred. The study identified a "trusted" I2Pdomain registrar ("NO.i2p") which appeared to have been abandoned by its administrator, and which the study identified as a potential target for law enforcement takeover. It alternatively suggested waiting for NO.i2p's server to fail, only tosocial engineer the I2P community into moving to a phony replacement. Another suggestion the study proposed was to register a mirror version of a target website under an identical domain.[101]

I2PCon

[edit]
David Dagon presenting at the first I2Pcon.

From August 15, 2015 to August 16, 2015 an I2P convention was held inToronto, Ontario.[105] The conference was hosted by a localhackerspace, Hacklab. The conference featured presentations from I2P developers and security researchers.

See also

[edit]

Software

[edit]

References

[edit]
  1. ^ab"I2P Project Members".geti2p.net.Archived from the original on 26 February 2019. Retrieved22 November 2015.
  2. ^idk."I2P 2.8.0 Released - Blog - I2P". Retrieved5 February 2025.
  3. ^I2P (project), Transifex,archived from the original on 2013-12-25, retrieved2014-02-12.
  4. ^"Licenses",Get involved, Get I2P,archived from the original on 2013-12-24, retrieved2013-12-24
  5. ^Gallagher, Sean (2015-01-13)."Under the hood of I2P, the Tor alternative that reloaded Silk Road".Ars Technica.Archived from the original on 2019-07-12. Retrieved2019-08-17.
  6. ^"Anonymity Networks: VPNs, Tor, and I2P | Restore Privacy". 3 February 2020.Archived from the original on 28 January 2021.
  7. ^Get I2P (blog),archived from the original on 2017-07-02, retrieved2013-12-24.
  8. ^"Secure Semireliable UDP (SSU)".geti2p.net. Archived fromthe original on 6 September 2023. Retrieved18 May 2023.
  9. ^"Garlic Routing – I2P".geti2p.net.Archived from the original on 2019-11-16. Retrieved2017-12-12.
  10. ^"IIP",Invisible IP, Source forge,archived from the original on 2009-05-18, retrieved2012-02-11.
  11. ^"Jrandom's Announcement – I2P".geti2p.net.Archived from the original on 2017-08-19. Retrieved2017-07-15.
  12. ^"ElGamal/AES + SessionTag Encryption – I2P".geti2p.net.Archived from the original on 2017-03-31. Retrieved2017-03-30.
  13. ^"Crypto/ECDSA – I2P Bugtracker".trac.i2p2.de.Archived from the original on 2015-05-20. Retrieved2017-03-30.
  14. ^zzz (8 February 2014)."0.9.11 Release".geti2p.net.Archived from the original on 2 September 2016. Retrieved15 September 2015.
  15. ^zzz (31 March 2014)."0.9.12 Release".geti2p.net.Archived from the original on 2 September 2016. Retrieved15 September 2015.
  16. ^zzz (22 May 2014)."0.9.13 Release".geti2p.net.Archived from the original on 2 August 2015. Retrieved15 September 2015.
  17. ^zzz (26 July 2014)."0.9.14 Release".geti2p.net.Archived from the original on 6 October 2015. Retrieved15 September 2015.
  18. ^zzz (9 August 2014)."0.9.14.1 Release".geti2p.net.Archived from the original on 2 September 2016. Retrieved15 September 2015.
  19. ^zzz (20 September 2014)."0.9.15 Release".geti2p.net.Archived from the original on 28 June 2017. Retrieved15 September 2015.
  20. ^zzz (1 November 2014)."0.9.16 Release".geti2p.net.Archived from the original on 3 March 2016. Retrieved15 September 2015.
  21. ^zzz (30 November 2014)."0.9.17 Release".geti2p.net.Archived from the original on 17 December 2015. Retrieved15 September 2015.
  22. ^zzz (22 February 2015)."0.9.18 Release".geti2p.net.Archived from the original on 11 September 2015. Retrieved15 September 2015.
  23. ^zzz (12 April 2015)."0.9.19 Release".geti2p.net.Archived from the original on 19 April 2015. Retrieved4 May 2015.
  24. ^zzz (2 June 2015)."0.9.20 Release".geti2p.net.Archived from the original on 11 September 2015. Retrieved15 September 2015.
  25. ^zzz (31 July 2015)."0.9.21 Release".geti2p.net.Archived from the original on 11 September 2015. Retrieved2 August 2015.
  26. ^zzz (12 December 2015)."0.9.22 Release".geti2p.net.Archived from the original on 4 March 2016. Retrieved13 September 2015.
  27. ^str4d (19 November 2015)."0.9.23 Release".geti2p.net.Archived from the original on 21 November 2015. Retrieved20 November 2015.{{cite web}}: CS1 maint: numeric names: authors list (link)
  28. ^zzz (27 January 2016)."0.9.24 Release".geti2p.net.Archived from the original on 2 February 2016. Retrieved29 January 2016.
  29. ^zzz (3 March 2016)."0.9.25 Release".geti2p.net.Archived from the original on 3 April 2016. Retrieved23 March 2016.
  30. ^zzz (7 June 2016)."0.9.26 Release".geti2p.net.Archived from the original on 2 September 2016. Retrieved7 June 2016.
  31. ^zzz (17 October 2016)."0.9.27 Release".geti2p.net.Archived from the original on 6 February 2017. Retrieved6 January 2017.
  32. ^zzz (12 December 2016)."0.9.28 Release".geti2p.net.Archived from the original on 29 August 2017. Retrieved15 July 2017.
  33. ^zzz (27 February 2017)."0.9.29 Release".geti2p.net.Archived from the original on 6 March 2017. Retrieved5 March 2017.
  34. ^zzz (3 May 2017)."0.9.30 Release".geti2p.net.Archived from the original on 3 October 2020. Retrieved14 June 2017.
  35. ^zzz (7 August 2017)."0.9.31 Release".geti2p.net.Archived from the original on 11 August 2017. Retrieved11 August 2017.
  36. ^zzz (11 November 2017)."0.9.32 Release".geti2p.net.Archived from the original on 15 November 2017. Retrieved15 November 2017.
  37. ^zzz (30 January 2018)."0.9.33 Release".geti2p.net.Archived from the original on 31 January 2018. Retrieved30 January 2018.
  38. ^zzz (10 April 2018)."0.9.34 Release".geti2p.net.Archived from the original on 12 April 2018. Retrieved11 April 2018.
  39. ^zzz (26 June 2018)."0.9.35 Release".geti2p.net.Archived from the original on 29 June 2018. Retrieved29 June 2018.
  40. ^zzz (23 August 2018)."0.9.36 Release".geti2p.net.Archived from the original on 27 March 2019. Retrieved29 January 2019.
  41. ^zzz (4 October 2018)."0.9.37 Release".geti2p.net.Archived from the original on 7 January 2019. Retrieved29 January 2019.
  42. ^zzz (22 January 2019)."0.9.38 Release".geti2p.net.Archived from the original on 29 January 2019. Retrieved29 January 2019.
  43. ^zzz (21 March 2019)."0.9.39 Release".geti2p.net.Archived from the original on 22 March 2019. Retrieved22 March 2019.
  44. ^zzz (7 May 2019)."0.9.40 Release".geti2p.net.Archived from the original on 2 August 2019. Retrieved7 December 2019.
  45. ^zzz (2 July 2019)."0.9.41 Release".geti2p.net.Archived from the original on 13 August 2019. Retrieved13 August 2019.
  46. ^zzz (28 August 2019)."0.9.42 Release".geti2p.net.Archived from the original on 3 October 2020. Retrieved27 September 2020.
  47. ^zzz (22 October 2019)."0.9.43 Release".geti2p.net.Archived from the original on 25 November 2019. Retrieved23 November 2019.
  48. ^zzz (1 December 2019)."0.9.44 Release".geti2p.net.Archived from the original on 5 December 2019. Retrieved7 December 2019.
  49. ^zzz (25 February 2020)."0.9.45 Release".geti2p.net.Archived from the original on 21 October 2020. Retrieved3 October 2020.
  50. ^zzz (25 May 2020)."0.9.46 Release".geti2p.net.Archived from the original on 20 September 2020. Retrieved3 October 2020.
  51. ^zzz (24 August 2020)."0.9.47 Release".geti2p.net.Archived from the original on 27 August 2020. Retrieved9 September 2020.
  52. ^zzz (30 November 2020)."0.9.48 Release".geti2p.net.Archived from the original on 20 January 2021. Retrieved6 January 2021.
  53. ^zzz (17 February 2021)."0.9.49 Release".geti2p.net.Archived from the original on 13 December 2021. Retrieved13 December 2021.
  54. ^zzz (17 May 2021)."0.9.50 Release".geti2p.net.Archived from the original on 26 May 2021. Retrieved1 June 2021.
  55. ^zzz (23 August 2021)."1.5.0 Release".geti2p.net.Archived from the original on 13 December 2021. Retrieved13 December 2021.
  56. ^1.6.0 was tagged, but not released.
  57. ^zzz (29 September 2021)."1.6.1 Release".geti2p.net.Archived from the original on 13 December 2021. Retrieved13 December 2021.
  58. ^"I2P: A scalable framework for anonymous communication – Introduction".I2P Website.Archived from the original on 2022-03-14. Retrieved2022-03-14.
  59. ^idk aka. eyedeekay (2022-03-06)."Network privacy via i2p w/ idk and Sadie".Opt Out Podcast. 00:55:43.Archived from the original on 2022-03-07. Retrieved2022-03-14.
  60. ^Mascis, Sadie (2022-03-06)."Network privacy via i2p w/ idk and Sadie"".Opt Out Podcast. 00:54:20.Archived from the original on 2022-03-07. Retrieved2022-03-13.
  61. ^Open Technology Fund (4 January 2022)."5G and Human Rights".Open Technology Fund Website.U.S. Agency for Global Media.Archived from the original on 2022-03-14. Retrieved2022-03-14.
  62. ^idk aka. eyedeekay (2022-03-06)."Network privacy via i2p w/ idk and Sadie".Opt Out Podcast. 00:34:20.Archived from the original on 2022-03-07. Retrieved2022-03-13.
  63. ^"How to Set up a Reseed Server".I2P Website.Archived from the original on 2022-03-14. Retrieved2022-03-13.
  64. ^"How to volunteer by helping I2P-Bote bootstrap – Blog".I2p Website.Archived from the original on 2022-04-07. Retrieved2022-03-13.
  65. ^idk aka. eyedeekay (2022-03-06)."Network privacy via i2p w/ idk and Sadie".Opt Out Podcast. 00:57:00.Archived from the original on 2022-03-07. Retrieved2022-03-13.
  66. ^"SAM",API, I2P,archived from the original on 2013-12-24, retrieved2013-12-24.
  67. ^"BOB",API, Get I2P,archived from the original on 2013-12-24, retrieved2013-12-24.
  68. ^"GitHub – subgraph/Orchid". 7 March 2019.Archived from the original on 9 August 2017. Retrieved20 October 2017 – via GitHub.
  69. ^idk."I2P 2.6.0 Release - Blog - I2P".geti2p.net.Archived from the original on 2024-07-21. Retrieved2024-07-21.
  70. ^R4SAS (2024-04-02),r4sas/Conversations-I2P, retrieved2024-05-24{{citation}}: CS1 maint: numeric names: authors list (link)
  71. ^"Decentralized instant messenger (XMPP aka Jabber) - i2pd documentation".i2pd.readthedocs.io. Retrieved2024-05-24.
  72. ^I2P Bittorrent FAQ (forum),DE: i2p2, archived fromthe original on 2011-11-03.
  73. ^The Hunting of the Snark Project – BitTorrent Application Suite, Klomp,archived from the original on 2013-11-24, retrieved2013-12-22.
  74. ^"How To for I2P Network Plugin",I2PHelper(Howto) (setup tutorial), Vuze,archived from the original on 2015-02-25, retrieved2015-02-23.
  75. ^"Rufus – BitTorrent Client".Sourceforge.Archived from the original on 2010-01-07. Retrieved2006-09-06..
  76. ^"GitHub – majestrate/XD: i2p bittorrent client". 22 March 2019.Archived from the original on 29 July 2017. Retrieved2 November 2017 – via GitHub.
  77. ^"Official Nachtblitz Resource".Archived from the original on 2022-11-01. Retrieved2022-11-01.
  78. ^"r/i2p – Introducing MuWire – a file-sharing application for I2P".reddit. 31 May 2019.Archived from the original on 2022-04-07. Retrieved2019-12-17.
  79. ^"Vuze Speeds Up Torrent Downloads Through "Swarm Merging"".TorrentFreak. 20 March 2015.Archived from the original on 17 October 2017. Retrieved4 June 2016.
  80. ^"I2PHelper HowTo".VuzeWiki.Archived from the original on 20 October 2017. Retrieved4 June 2016.
  81. ^"StormyCloud – I2P Outproxy | I2P Anonymous Network".stormycloud.org. Retrieved2023-07-24.
  82. ^i2p/i2p.i2p-bote, The I2P Project, 2024-03-06, retrieved2024-03-08
  83. ^i2p/i2p.i2p-bote, The I2P Project, 2024-09-20, retrieved2024-10-13
  84. ^Introducing I2P, Nov 10, 2015,archived from the original on November 25, 2015, retrievedNovember 11, 2015
  85. ^"PurpleI2P/i2pd".GitHub.Archived from the original on 2018-10-04. Retrieved2018-08-20.
  86. ^"Invisible Internet Protocol Daemon".i2pd.website.Archived from the original on 2018-08-20. Retrieved2018-08-20.
  87. ^Privacy Solutions project, archived fromthe original on 19 April 2018.
  88. ^List of ongoing Privacy Solutions projects,archived from the original on 2021-05-07, retrieved2022-08-27.
  89. ^"Invisible Internet Protocol Daemon".i2pd.website.Archived from the original on 2018-08-20. Retrieved2018-08-20.
  90. ^Active development, The Privacy Solutions, 22 September 2022,archived from the original on 12 November 2014, retrieved16 January 2015
  91. ^Active development, Purple I2P, 22 September 2022,archived from the original on 4 February 2016, retrieved7 February 2016
  92. ^Android App Releases,archived from the original on 2014-12-15, retrieved2014-12-15
  93. ^Discontinued, Nightweb,archived from the original on 2017-07-04, retrieved2015-04-26.
  94. ^"Add I2P support using I2P SAM by vasild · Pull Request #20685 · bitcoin/bitcoin".GitHub.Archived from the original on 2021-03-03. Retrieved2021-04-03.
  95. ^"I2P con 2015 – Growing the Network, Spreading the Word, 03:41".YouTube. 2 September 2015.Archived from the original on 2022-04-07. Retrieved2018-06-30.
  96. ^ab"Intro".I2P.Archived from the original on 6 April 2016. Retrieved4 June 2016.
  97. ^"Naming and Addressbook – I2P".geti2p.net.Archived from the original on 29 March 2016. Retrieved4 June 2016.
  98. ^"Tunnel Routing".I2P.Archived from the original on 26 March 2016. Retrieved4 June 2016.
  99. ^"The Network Database".I2P.Archived from the original on 7 March 2016. Retrieved4 June 2016.
  100. ^Kack, Christopher (2012-09-11)."Layer 7 DOS against I2P darknet".Kejsarmakten:Development. Archived fromthe original on 2012-10-14. Retrieved2021-03-13.
  101. ^abBazli, Behnam; Wilson, Maxim; Hurst, William (2017-01-01)."The dark side of I2P, a forensic analysis case study".Systems Science & Control Engineering.5 (1):278–286.doi:10.1080/21642583.2017.1331770.
  102. ^Storm, Darlene (2014-07-24)."Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users".Computerworld.Archived from the original on 2020-09-29. Retrieved2021-03-13.
  103. ^"I2P patched against de-anonymizing 0-day, Tails integration still to follow".Help Net Security. 2014-07-29.Archived from the original on 2020-12-10. Retrieved2021-03-13.
  104. ^"0.9.14 Release – Blog – I2P".geti2p.net.Archived from the original on 2021-04-22. Retrieved2021-03-13.
  105. ^"I2PCon: Mission Accomplished – Blog".I2P.Archived from the original on 10 June 2016. Retrieved4 June 2016.

External links

[edit]

Technologies
Software
Related Software
Email clients
Secure
communication
OTR
SSH
TLS & SSL
VPN
ZRTP
P2P
DRA
Disk encryption
(Comparison)
Anonymity
File systems(List)
Security-focused
operating system
Service providers
Educational
Anti–computer forensics
Related topics
Networks,
protocols
Centralized
Decentralized
Historic
Comparisons
ofclients
Hyperlinks
Uses
Concepts
Privacy
Internal
technologies
Background
Principles
With aproxy server
Without a proxy server
Anti-censorship software
Free software
Proprietary software
Browser extensions
Anonymity
Anonymous software
Anonymous P2P network
Physical circumvention methods
Relevant organizations
Reference
Italics indicates that maintenance of the tool has been discontinued.CategoryCommons
Portal:
Retrieved from "https://en.wikipedia.org/w/index.php?title=I2P&oldid=1278246689"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp