{% block title %}{{ _('The Invisible Internet Project') }}{% endblock %}
{% block metadesc %}{{ _('Anonymous peer-to-peer distributed communication layer built with open source tools and designed to run any traditional Internet service such as email, IRC or web hosting.') }}{% endblock %}
<li>{% trans %}I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.{%- endtrans %}</li>
<p>{% trans %}The network is people powered . Peers make a portion of their resources, particularly bandwidth, available to other network participants. This allows the network to function without relying on centralized servers.{% endtrans %} <ahref="{{ site_url('docs/protocol') }}">{% trans %}Learn more about the Protocol Stack{% endtrans %}</a>.</p>
<h1>{% trans %}Built For Communication{% endtrans %}</h1>
<p>{% trans %}I2P has an application layer with easy to use {% endtrans %}<ahref="{{ site_url('docs/api/i2ptunnel') }}">{% trans %}APIs for creating your own privacy - aware apps.{% endtrans %}</a></p>
<ahref="https://pixabay.com/users/montevideo-5677795/?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=3621630%22%3EMontevideo">Hero Image courtesy of Pixabay artist Montevideo</a></br>
<!--<a href="https://decentpatterns.xyz/report/#key-terms">*Further information about decentralized principles collated by DOTS(Decentralization Off-The-Shelf) study</a>-->