2008-01-31 20:38:37 +00:00
|
|
|
{% extends "_layout.html" %}
|
2008-03-16 16:17:05 +00:00
|
|
|
{% block title %}I2P Anonymous Network{% endblock %}
|
2008-01-31 20:38:37 +00:00
|
|
|
{% block content %}
|
2009-01-25 13:54:13 +00:00
|
|
|
<table cellspacing="10"><tr><td valign="top">
|
2004-07-12 17:22:55 +00:00
|
|
|
<p><b>Latest version:</b><br />
|
2009-05-18 17:25:20 +00:00
|
|
|
2009-05-18 - I2P 0.7.3 - {{ urlify("release-0.7.3", "Announcement", "html")}}
|
2007-01-05 02:55:06 +00:00
|
|
|
- <a href="download">Download</a><br />
|
2007-09-29 05:06:36 +00:00
|
|
|
2007-09-28 - Syndie 1.101a -
|
2008-02-03 02:46:04 +00:00
|
|
|
<!-- <a href="http://dev.i2p.net/pipermail/i2p/2007-September/001355.html">Announcement</a> -->
|
|
|
|
- <a href="http://syndie.i2p2.de/download.html">Download</a>
|
2004-07-12 17:22:55 +00:00
|
|
|
</p>
|
2008-02-02 21:52:38 +00:00
|
|
|
<p><b>Latest News:</b><br />
|
2009-05-18 17:25:20 +00:00
|
|
|
2009-05-18 - I2P 0.7.3
|
|
|
|
<a href="release-0.7.3.html">Released</a>
|
|
|
|
<br />
|
2009-04-19 18:07:34 +00:00
|
|
|
2009-04-19 - I2P 0.7.2
|
|
|
|
<a href="release-0.7.2.html">Released</a>
|
|
|
|
<br />
|
2009-03-30 01:27:53 +00:00
|
|
|
2009-03-29 - I2P 0.7.1
|
|
|
|
<a href="release-0.7.1.html">Released</a>
|
|
|
|
<br />
|
2009-03-09 17:20:22 +00:00
|
|
|
2009-03-09 - <a href="http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/">zzz interviewed by gulli.com</a>
|
|
|
|
<br />
|
2009-02-12 10:28:52 +00:00
|
|
|
2009-02-10 - <a href="donate.html">Donations</a> open again!</a>
|
|
|
|
<br />
|
2009-01-25 14:02:02 +00:00
|
|
|
2009-01-25 - I2P 0.7
|
2009-01-25 13:54:13 +00:00
|
|
|
<a href="release-0.7.html">Released</a>
|
|
|
|
<br />
|
|
|
|
<td>
|
|
|
|
<a href="download"><img src="/_static/images/logo07c.jpg" alt="0.7 logo" border="none"/></a>
|
|
|
|
</table>
|
2006-02-15 06:30:52 +00:00
|
|
|
|
|
|
|
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
|
|
|
|
|
2008-03-16 16:17:05 +00:00
|
|
|
<p>
|
|
|
|
Many applications are available that interface with I2P, including
|
2009-03-30 15:43:19 +00:00
|
|
|
mail, peer-peer, IRC chat, and others.
|
2008-03-16 16:17:05 +00:00
|
|
|
</p>
|
|
|
|
|
2009-05-18 17:25:20 +00:00
|
|
|
<p>
|
|
|
|
The I2P project was formed in 2003 to support the efforts of
|
|
|
|
those trying to build a more free society by offering them an uncensorable,
|
|
|
|
anonymous, and secure communication system. I2P is a development effort
|
|
|
|
producing a low latency, fully distributed, autonomous, scalable, anonymous,
|
|
|
|
resilient, and secure network. The goal is to operate successfully in
|
|
|
|
hostile environments. even when an organization with substantial financial
|
|
|
|
or political resources attacks it. All aspects of the network are open source and
|
|
|
|
available without cost, as this should both assure the people using it that the software
|
|
|
|
does what it claims, as well as enable others to contribute and improve
|
|
|
|
upon it to defeat aggressive attempts to
|
|
|
|
stifle free speech.
|
|
|
|
</p>
|
|
|
|
|
2006-02-15 06:30:52 +00:00
|
|
|
<p>Anonymity is not a boolean - we are not trying to make something
|
|
|
|
"perfectly anonymous", but instead are working at making attacks more and more
|
2009-05-18 17:25:20 +00:00
|
|
|
expensive to mount. I2P is a low latency mix network,
|
2006-02-15 06:30:52 +00:00
|
|
|
and there are limits to the anonymity offered by such a system, but the applications
|
2008-02-03 02:46:04 +00:00
|
|
|
on top of I2P, such as <a href="http://syndie.i2p2.de/">Syndie</a>, I2P mail,
|
2006-02-15 06:30:52 +00:00
|
|
|
and I2PSnark extend it to offer both additional functionality and protection.</p>
|
|
|
|
|
2009-05-18 17:25:20 +00:00
|
|
|
<p>I2P is still a work in progress.
|
|
|
|
It should not be relied upon for "guaranteed" anonymity at this time,
|
|
|
|
due to the relatively small size of the network and the lack of extensive academic review.
|
|
|
|
It is not immune to to attacks from those with unlimited resources, and may never be,
|
|
|
|
due to the inherent limitations of low-latency mix networks.
|
2008-03-16 16:17:05 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
I2P works by routing traffic through other peers, as shown in the following picture.
|
2009-05-18 17:25:20 +00:00
|
|
|
All traffic is encrypted end-to-end.
|
2008-03-16 16:17:05 +00:00
|
|
|
For more information about how I2P works, see the
|
|
|
|
<a href="how_intro">Introduction</a>.
|
|
|
|
</p><p>
|
|
|
|
<center>
|
2009-05-18 17:25:20 +00:00
|
|
|
<img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" />
|
2008-03-16 16:17:05 +00:00
|
|
|
</center>
|
|
|
|
</p>
|
|
|
|
|
2008-01-31 20:38:37 +00:00
|
|
|
{% endblock %}
|