Jump to content


Photo

I2P - Anonymity for the Masses

proxy. tor

  • You cannot start a new topic
  • Please log in to reply
No replies to this topic

#1 rokytnji

rokytnji

    Linux Friganeer

  • Moderators
  • 5,101 posts
  • 219 topics
    • Time Online: 54d 5h 19m 42s
  • Joined February 27, 2008
  • Age: 60
  • Skin: IP.Board
  • Local time: 10:30 PM
  • Zodiac:Aquarius
  • Gender:Male
  • Location:Pecos, Texas
  • Interests:Motorcycles,Vodka,
    Mead,Cossacks,Runs,Linux.
    Own a small Bike shop. Have 6 running Harley Davidsons for personal use. Have a 1980 XLS that'll boot&scoot.
  • OS:other
  • Country:
Offline

Posted 20 November 2011 - 10:55 PM

I am posting this mainly for Ubuntu and Debian users. Though Mac and Windows and BSD users can use I2P protocol also if they search for it. Thanks to lugoteehalt and craigevil from linux questions for making me aware of this.


1. INTRODUCTION

For many years people have wanted to protect their right to privacy. As technology changes, it seems that privacy evolves away more and more. I2P is a protocol used for an encrypted multi-proxy on the Internet. While, this sounds simple, there is actually a lot of work going on with I2P to achieve this. Unlike some multi-proxies, I2P will allow you to tunnel many more applications through it than just web browsing, making it a very robust protocol.
I2P is available for all platforms, not just Linux. For this example I have used Debian Sid to perform the installation. With the exception of 'apt-get', these instructions should work fine with any Linux distribution. But if you experience problems, please seek documentation for your distro or visit our new Linux Forum.
Link

some more links and info on this subject
Also see Debian/Ubuntu - I2P : http://www.i2p2.de/debian#debian
The Invisible Internet Project

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys).


A Gentle Introduction - I2P - http://www.i2p2.de/how_intro.html

For more ideas on the subject take a look at:
Security and Privacy on the Internet -
https://www.linuxque....internet-3080/

475019.png
Free Linux Books USA

Self Service Linux - Mastering the Art of Problem Determination

Linux Command Guide

Linux Courses at Home

The Linux Live CD list
 

I Have a Masters in Raising Hell. So You Better Check it before You Wreck It.

 

Certified Total Geek @ http://www.innergeek.us

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users