![]() ![]() In comparison, I2P's primary strengths are: optimization for hidden services a fully distributed design better peer selection varied and untrusted directory servers peer-to-peer friendly nature improved load balancing and resilience unidirectional tunnels protection against client activity detection short-lived tunnels low bandwidth overhead for full peers TCP and UDP transports and being based on the Java programming language. Tor's primary strengths are: a larger user base greater academic interest and research significant funding a large development team greater resistance to state-level censorship (TLS transport and bridges) large number of exit nodes better memory usage thorough documentation low client bandwidth overhead higher throughput and lower latency. The I2P comparison page notes the relative strengths of Tor and I2P those are summarized below. Similar to Inbound Gateway + Outbound Endpoint I2P Client Whitelist or Encrypted LeaseSets ![]() ![]() Many of Tor's concepts have (virtual) equivalents in I2P, despite the terminology being somewhat different. The network is actively being developed and has not yet reached the 1.0 release, but the current roadmap describes their active schedule. RETROSHARE BUILD ENCIRONMENT SOFTWAREThe core I2P Software Development Kit (SDK) and the current router implementation is accomplished in Java, and there is a simple socket based API for accessing the network from other languages (with a C library available, and both Python and Perl in development). The I2P development team is an open group that welcomes all parties who are interested in getting involved. In contrast to the Tor network, I2P is focused on creating a community around P2P darknet services rather than providing "outproxies"(exits) to the clearnet. To learn more about I2P technical details, see here. Every router transports traffic for its peers which it uses as cover traffic for its own. Each client application has their own I2P 'router' that finds other clients by querying against the fully distributed 'network database' - a custom structured distributed hash table (DHT) based on the Kademlia algorithm. This design is known as garlic routing which is a variant of onion routing (used in the Tor network) and benefits from the research on the latter but makes some different tradeoffs. All communication is encrypted end-to-end - in total there are four layers of encryption used when sending a message - and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). ![]() The network itself is strictly message-based (IP), but there is a library available to allow reliable streaming communication on top of it (TCP). The I2P anonymous network exposes a simple layer that applications can use to anonymously and securely send messages to each other through "tunnels". Online communities wishing to organize in restrictive environments can do so anonymously to mitigate political threat and protect each other. Mirrored sites hosted on the network allow access to news outlets and other resources in areas where information is being filtered or denied. It is intended to protect communication and resist monitoring by third parties such as ISPs.Īside from anonymizing traffic within the network, I2P functions with the same capabilities as the Internet, however its design and decentralization create a censorship resistant environment for the free-flow of information. It allows users to create and access content and build online communities on a network that is both distributed and dynamic. I2P is an anonymous network built on top of the internet. The Invisible Internet Project (I2P) homepage provides a simple overview of the protocol:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |