2008-01-31 20:38:37 +00:00
|
|
|
{% extends "_layout.html" %}
|
2008-03-16 16:17:05 +00:00
|
|
|
{% block title %}I2P Anonymous Network{% endblock %}
|
2008-01-31 20:38:37 +00:00
|
|
|
{% block content %}
|
2004-07-12 17:22:55 +00:00
|
|
|
<p><b>Latest version:</b><br />
|
2008-06-08 11:50:31 +00:00
|
|
|
2008-06-07 - I2P 0.6.2 - {{ urlify("release-0.6.2", "Announcement", "html")}}
|
2007-01-05 02:55:06 +00:00
|
|
|
- <a href="download">Download</a><br />
|
2007-09-29 05:06:36 +00:00
|
|
|
2007-09-28 - Syndie 1.101a -
|
2008-02-03 02:46:04 +00:00
|
|
|
<!-- <a href="http://dev.i2p.net/pipermail/i2p/2007-September/001355.html">Announcement</a> -->
|
|
|
|
- <a href="http://syndie.i2p2.de/download.html">Download</a>
|
2004-07-12 17:22:55 +00:00
|
|
|
</p>
|
2008-02-02 21:52:38 +00:00
|
|
|
<p><b>Latest News:</b><br />
|
2008-06-08 11:50:31 +00:00
|
|
|
2008-06-07 - I2P 0.6.2
|
|
|
|
<a href="release-0.6.2.html">Released</a>
|
|
|
|
<br />
|
2008-04-27 13:05:35 +00:00
|
|
|
2008-04-26 - I2P 0.6.1.33
|
|
|
|
<a href="release-0.6.1.33.html">Released</a>
|
|
|
|
<br />
|
2008-04-20 19:12:19 +00:00
|
|
|
2008-04-20 -
|
|
|
|
<a href="http://trac.i2p2.i2p/">We are now using Trac as bugtracker</a>
|
|
|
|
<br />
|
2008-03-26 20:17:23 +00:00
|
|
|
2008-03-26 -
|
|
|
|
<a href="faq.html#reseed">New reseed URL</a>
|
|
|
|
<br />
|
2008-03-16 16:17:05 +00:00
|
|
|
2008-03-16 -
|
|
|
|
<a href="http://forum.i2p.net/">forum.i2p.net</a> has permanently moved to
|
|
|
|
<a href="http://forum.i2p2.de/">forum.i2p2.de</a>.
|
|
|
|
<a href="http://forum.i2p/">forum.i2p</a> is back up.
|
|
|
|
<br />
|
2008-03-11 11:52:54 +00:00
|
|
|
2008-02-05 - Upgrading from 0.6.1.30 or earlier -
|
2008-03-11 12:49:47 +00:00
|
|
|
<a href=upgrade-0.6.1.30.html>instructions</a>
|
2008-02-10 22:43:33 +00:00
|
|
|
<br />
|
|
|
|
2008-02-01 - <a href="statnotes0108">status notes 01 2008</a>
|
2006-02-15 06:30:52 +00:00
|
|
|
|
|
|
|
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
|
|
|
|
|
2008-03-16 16:17:05 +00:00
|
|
|
<p>
|
|
|
|
Many applications are available that interface with I2P, including
|
|
|
|
mail, peer-peer file sharing, IRC chat, and others.
|
|
|
|
</p>
|
|
|
|
|
2006-02-15 06:30:52 +00:00
|
|
|
<p>Anonymity is not a boolean - we are not trying to make something
|
|
|
|
"perfectly anonymous", but instead are working at making attacks more and more
|
|
|
|
expensive to mount. I2P alone is what could be called a "low latency mix network",
|
|
|
|
and there are limits to the anonymity offered by such a system, but the applications
|
2008-02-03 02:46:04 +00:00
|
|
|
on top of I2P, such as <a href="http://syndie.i2p2.de/">Syndie</a>, I2P mail,
|
2006-02-15 06:30:52 +00:00
|
|
|
and I2PSnark extend it to offer both additional functionality and protection.</p>
|
|
|
|
|
|
|
|
<p>I2P is still a work in progress, and should only be used for testing or
|
2008-03-16 16:17:05 +00:00
|
|
|
development purposes prior to the 1.0 release.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
I2P works by routing traffic through other peers, as shown in the following picture.
|
|
|
|
For more information about how I2P works, see the
|
|
|
|
<a href="how_intro">Introduction</a>.
|
|
|
|
</p><p>
|
|
|
|
<center>
|
|
|
|
<img src="/_static/images/net.png" alt="Network topology example" />
|
|
|
|
</center>
|
|
|
|
</p>
|
|
|
|
|
2008-01-31 20:38:37 +00:00
|
|
|
{% endblock %}
|