<p>The I2P network provides <ahref="how_threatmodel.html">strong privacy protections</a> for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted <ahref="anonymity_is_not_a_boolean.html">anonymously</a> on I2P. Though suitable for general privacy-conscious usage, I2P is also designed to protect users under high risk, such as:</p>
<p>On the public Internet your external IP address is unique and provides a strong correlation between your online activities and your true identity. Effective privacy is hard to achieve because the Internet, by design, allows senders and receivers to see each other's external IP address. Another fundamental threat to privacy results from Internet-enabled applications that don't encrypt – or don't sufficiently encrypt – your sensitive communications.</p>
<p>I2P anonymizes Internet communications by: 1) employing many techniques to make it <ahref="how_threatmodel.html">exceedingly difficult</a> for a receiver to prove the IP address of a sender and vice versa; and 2) by strongly encrypting all communication between the sender and receiver.</p>
<p>To explore the workings of I2P in further detail please read <ahref="gentle_intro.html">A Gentle Introduction to the I2P Network</a>. The technically-minded may wish to proceed to the <ahref="technical_intro.html">I2P Network Technical Introduction</a>.</p>