2008-01-31 20:38:37 +00:00
|
|
|
{% extends "_layout.html" %}
|
2008-03-16 16:17:05 +00:00
|
|
|
{% block title %}I2P Anonymous Network{% endblock %}
|
2008-01-31 20:38:37 +00:00
|
|
|
{% block content %}
|
2009-07-04 18:49:05 +00:00
|
|
|
<table cellspacing="10" class="announce"><tr class="announce"><td valign="top" class="announce">
|
2009-05-30 21:43:30 +00:00
|
|
|
<div class="version">
|
2011-06-30 20:05:47 +00:00
|
|
|
<b>Latest version:</b><div class="underline"></div>
|
2012-01-06 15:37:40 +00:00
|
|
|
2012-01-06 - <strong>I2P 0.8.12</strong> - {{ urlify("release-0.8.12", "Announcement", "html")}}
|
2009-05-30 21:43:30 +00:00
|
|
|
- <a href="download">Download</a><br /><div class="underline"></div>
|
2009-06-03 03:51:48 +00:00
|
|
|
2007-09-28 - <strong>Syndie 1.101a</strong> -
|
2008-02-03 02:46:04 +00:00
|
|
|
<!-- <a href="http://dev.i2p.net/pipermail/i2p/2007-September/001355.html">Announcement</a> -->
|
|
|
|
- <a href="http://syndie.i2p2.de/download.html">Download</a>
|
2009-05-30 21:43:30 +00:00
|
|
|
</div>
|
|
|
|
<div class="news">
|
2011-06-30 20:05:47 +00:00
|
|
|
<b>Latest News:</b><div class="underline"></div>
|
2012-01-06 15:37:40 +00:00
|
|
|
2012-01-06 - I2P 0.8.12 <a href="release-0.8.12.html">Released</a><br />
|
2011-11-08 14:20:32 +00:00
|
|
|
2011-11-08 - I2P 0.8.11 <a href="release-0.8.11.html">Released</a><br />
|
2011-10-20 11:39:43 +00:00
|
|
|
2011-10-20 - I2P 0.8.10 <a href="release-0.8.10.html">Released</a><br />
|
2011-10-11 21:06:27 +00:00
|
|
|
2011-10-11 - I2P 0.8.9 <a href="release-0.8.9.html">Released</a><br />
|
2011-01-25 22:30:02 +00:00
|
|
|
</div>
|
2009-05-30 21:43:30 +00:00
|
|
|
<!--
|
2009-01-25 13:54:13 +00:00
|
|
|
<td>
|
2009-05-30 21:43:30 +00:00
|
|
|
<a href="download"><img src="/_static/images/logo07c.jpg" alt="0.7 logo" border="none"/></a> -->
|
2011-02-27 02:59:28 +00:00
|
|
|
</td></tr></table>
|
2009-05-30 21:43:30 +00:00
|
|
|
<div class="underline"></div>
|
2006-02-15 06:30:52 +00:00
|
|
|
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
|
|
|
|
|
2008-03-16 16:17:05 +00:00
|
|
|
<p>
|
|
|
|
Many applications are available that interface with I2P, including
|
2011-06-30 20:05:47 +00:00
|
|
|
mail, peer-peer, IRC chat, and others.</p>
|
2010-11-16 13:20:37 +00:00
|
|
|
<!--
|
2010-01-02 02:47:28 +00:00
|
|
|
</p><p>
|
|
|
|
I2P is growing fast! There were nine releases in 2009, and traffic grew by a factor of 5:
|
2010-08-06 15:39:22 +00:00
|
|
|
</p>
|
2010-01-02 02:47:28 +00:00
|
|
|
<center>
|
|
|
|
<img src="/_static/images/bandwidth2009.png" alt="2009 bandwidth" />
|
|
|
|
</center>
|
2010-11-16 13:20:37 +00:00
|
|
|
-->
|
2008-03-16 16:17:05 +00:00
|
|
|
|
2009-05-18 17:25:20 +00:00
|
|
|
<p>
|
|
|
|
The I2P project was formed in 2003 to support the efforts of
|
|
|
|
those trying to build a more free society by offering them an uncensorable,
|
|
|
|
anonymous, and secure communication system. I2P is a development effort
|
|
|
|
producing a low latency, fully distributed, autonomous, scalable, anonymous,
|
|
|
|
resilient, and secure network. The goal is to operate successfully in
|
2011-02-27 14:29:38 +00:00
|
|
|
hostile environments - even when an organization with substantial financial
|
2009-05-18 17:25:20 +00:00
|
|
|
or political resources attacks it. All aspects of the network are open source and
|
|
|
|
available without cost, as this should both assure the people using it that the software
|
|
|
|
does what it claims, as well as enable others to contribute and improve
|
|
|
|
upon it to defeat aggressive attempts to
|
|
|
|
stifle free speech.
|
|
|
|
</p>
|
|
|
|
|
2006-02-15 06:30:52 +00:00
|
|
|
<p>Anonymity is not a boolean - we are not trying to make something
|
|
|
|
"perfectly anonymous", but instead are working at making attacks more and more
|
2009-05-18 17:25:20 +00:00
|
|
|
expensive to mount. I2P is a low latency mix network,
|
2006-02-15 06:30:52 +00:00
|
|
|
and there are limits to the anonymity offered by such a system, but the applications
|
2008-02-03 02:46:04 +00:00
|
|
|
on top of I2P, such as <a href="http://syndie.i2p2.de/">Syndie</a>, I2P mail,
|
2006-02-15 06:30:52 +00:00
|
|
|
and I2PSnark extend it to offer both additional functionality and protection.</p>
|
|
|
|
|
2009-05-18 17:25:20 +00:00
|
|
|
<p>I2P is still a work in progress.
|
|
|
|
It should not be relied upon for "guaranteed" anonymity at this time,
|
|
|
|
due to the relatively small size of the network and the lack of extensive academic review.
|
2011-09-24 01:41:07 +00:00
|
|
|
It is not immune to attacks from those with unlimited resources, and may never be,
|
2009-05-18 17:25:20 +00:00
|
|
|
due to the inherent limitations of low-latency mix networks.
|
2008-03-16 16:17:05 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
I2P works by routing traffic through other peers, as shown in the following picture.
|
2009-05-18 17:25:20 +00:00
|
|
|
All traffic is encrypted end-to-end.
|
2008-03-16 16:17:05 +00:00
|
|
|
For more information about how I2P works, see the
|
|
|
|
<a href="how_intro">Introduction</a>.
|
2010-08-06 15:39:22 +00:00
|
|
|
</p>
|
2011-06-30 20:05:47 +00:00
|
|
|
|
2011-12-21 18:20:26 +00:00
|
|
|
<div class="box" style="text-align:center;">
|
2009-05-18 17:25:20 +00:00
|
|
|
<img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" />
|
2009-05-30 21:43:30 +00:00
|
|
|
</div>
|
2011-06-30 20:05:47 +00:00
|
|
|
|
2008-03-16 16:17:05 +00:00
|
|
|
|
2008-01-31 20:38:37 +00:00
|
|
|
{% endblock %}
|