Jump to content


I2P - Anonymity for the Masses

proxy. tor

  • You cannot start a new topic
  • Please log in to reply
No replies to this topic

#1 rokytnji


    Linux Friganeer

  • Moderators
  • 5,799 posts
  • 259 topics
    • Time Online: 67d 9h 5m 35s
  • Joined February 27, 2008
  • Age: 61
  • Skin: IP.Board
  • Local time: 06:11 PM
  • Zodiac:Aquarius
  • Gender:Male
  • Location:Pecos, Texas
  • Interests:Motorcycles,Vodka,
    Own a small Bike shop. Have 6 running Harley Davidsons for personal use. Have a 1980 XLS that'll boot&scoot.
  • OS:other
  • Country:

Posted 20 November 2011 - 10:55 PM

I am posting this mainly for Ubuntu and Debian users. Though Mac and Windows and BSD users can use I2P protocol also if they search for it. Thanks to lugoteehalt and craigevil from linux questions for making me aware of this.


For many years people have wanted to protect their right to privacy. As technology changes, it seems that privacy evolves away more and more. I2P is a protocol used for an encrypted multi-proxy on the Internet. While, this sounds simple, there is actually a lot of work going on with I2P to achieve this. Unlike some multi-proxies, I2P will allow you to tunnel many more applications through it than just web browsing, making it a very robust protocol.
I2P is available for all platforms, not just Linux. For this example I have used Debian Sid to perform the installation. With the exception of 'apt-get', these instructions should work fine with any Linux distribution. But if you experience problems, please seek documentation for your distro or visit our new Linux Forum.

some more links and info on this subject
Also see Debian/Ubuntu - I2P : http://www.i2p2.de/debian#debian
The Invisible Internet Project

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys).

A Gentle Introduction - I2P - http://www.i2p2.de/how_intro.html

For more ideas on the subject take a look at:
Security and Privacy on the Internet -

Free Linux Books USA

Self Service Linux - Mastering the Art of Problem Determination

Linux Command Guide

Linux Courses at Home

The Linux Live CD list

Mac: We need to hide what is going on.
Linux: We need to tell the community what is going on.
Windows: What the hell is going on?


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users