From bc139e5a7c5271969f3c7f73db42f1e22d053779 Mon Sep 17 00:00:00 2001
From: idk
-
diff --git a/i2p2www/blog/2010/03/15/release-0.7.12.html b/i2p2www/blog/2010/03/15/release-0.7.12.html
index fd9089c4..46388b58 100644
--- a/i2p2www/blog/2010/03/15/release-0.7.12.html
+++ b/i2p2www/blog/2010/03/15/release-0.7.12.html
@@ -4,7 +4,7 @@ themes, translations, or standalone programs.
Some plugins are already available for testing.
We are hopeful this support will enable rapid development of innovative i2p applications.
-The release fixes the blank-page bug when an I2P site is not reachable, +The release fixes the blank-page bug when an I2P Site is not reachable, and also improves handling of clock skews and IP changes. It adds support for a new, smaller tunnel build message, that will be tested in this release and enabled in the next release. diff --git a/i2p2www/blog/2011/03/02/release-0.8.4.html b/i2p2www/blog/2011/03/02/release-0.8.4.html index 7bc983bb..d2076ddc 100644 --- a/i2p2www/blog/2011/03/02/release-0.8.4.html +++ b/i2p2www/blog/2011/03/02/release-0.8.4.html @@ -19,7 +19,7 @@ Please volunteer on IRC #i2p-dev.
* Fix a severe memory leak in router I2CP session management that caused router crashes for people running the Robert bittorrent client
-
* Fix a bug from 0.8.2 that filtered cookies in the HTTP Server tunnel, causing authentication problems for some I2P sites
+
* Fix a bug from 0.8.2 that filtered cookies in the HTTP Server tunnel, causing authentication problems for some I2P Sites
* Several fixes for rare NPEs
I2PSnark
diff --git a/i2p2www/pages/downloads/debian.html b/i2p2www/pages/downloads/debian.html index 0b635fc5..f9470b4a 100644 --- a/i2p2www/pages/downloads/debian.html +++ b/i2p2www/pages/downloads/debian.html @@ -238,7 +238,7 @@ as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative. {%- endtrans %}{% trans browserconfig=site_url('about/browser-config') -%} -If you want to reach I2P sites via your browser, have a look on the browser proxy setup page for an easy howto. +If you want to reach I2P Sites via your browser, have a look on the browser proxy setup page for an easy howto. {%- endtrans %}
{% endblock %} diff --git a/i2p2www/pages/downloads/firefox.html b/i2p2www/pages/downloads/firefox.html index 56d22d6a..0757c00b 100644 --- a/i2p2www/pages/downloads/firefox.html +++ b/i2p2www/pages/downloads/firefox.html @@ -4,7 +4,7 @@ {% block content %}{% trans -%} -Now that you have joined the I2P network, you will want to see I2P sites and and +Now that you have joined the I2P network, you will want to see I2P Sites and and other content that is hosted on the network. The Firefox browser is pre-configured to allow you to access the content available on the network. It also keeps your I2P search activity separate from your internet search activity. diff --git a/i2p2www/pages/downloads/list.html b/i2p2www/pages/downloads/list.html index f75b506a..6acde8a1 100644 --- a/i2p2www/pages/downloads/list.html +++ b/i2p2www/pages/downloads/list.html @@ -65,7 +65,7 @@ Windows: Java 8 is recommended. Java 9 or higher may not work.
When you download the I2P software bundle, you get everything you need to connect and start participating in the I2P network and community. It even includes basic -applications for every user, like e-mail, bittorrent, and a basic I2P site for +applications for every user, like e-mail, bittorrent, and a basic I2P Site for you to personalize and share.
diff --git a/i2p2www/pages/downloads/post-install.html b/i2p2www/pages/downloads/post-install.html index 884c3521..37f0e806 100644 --- a/i2p2www/pages/downloads/post-install.html +++ b/i2p2www/pages/downloads/post-install.html @@ -32,5 +32,5 @@ as the default settings of 96 KBps down / 40 KBps up are fairly slow. {%- endtrans %}{% trans browserconfig=site_url('about/browser-config') -%} -If you want to reach I2P sites via your browser, have a look on the browser proxy setup page for an easy howto. +If you want to reach I2P Sites via your browser, have a look on the browser proxy setup page for an easy howto. {%- endtrans %}
diff --git a/i2p2www/pages/downloads/windows.html b/i2p2www/pages/downloads/windows.html index 7c1a78bf..9a5ce674 100644 --- a/i2p2www/pages/downloads/windows.html +++ b/i2p2www/pages/downloads/windows.html @@ -169,7 +169,7 @@ configuration wizard.{%- endtrans %}{% trans -%}If you want to re-run the welcome wizard after completing it, you can visit the page on{%- endtrans %} your router console.
-{% trans -%}That's it! You're now ready to use I2P. You can browse I2P sites, download files, host services, +
{% trans -%}That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services, e-mail and chat anonymously. Visit the router console homepage to get started.{%- endtrans %}
diff --git a/i2p2www/pages/site/browser/intro.html b/i2p2www/pages/site/browser/intro.html index aa59dff7..f624c6f1 100644 --- a/i2p2www/pages/site/browser/intro.html +++ b/i2p2www/pages/site/browser/intro.html @@ -28,11 +28,11 @@{% trans bname=browser_name(), bsuff=browser_postname() %}{{ bname }} {{ bsuff }} is an easy-to-use bundle -that provides a streamlined way to use I2P applications and to browse I2P sites. +that provides a streamlined way to use I2P applications and to browse I2P Sites. Although it can provide access to the regular internet via an outproxy, it also integrates secure decentralized browsing, file sharing, and e-mail.{% endtrans %}
-{% trans -%} Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying capabilities. An example application would be a web application that does client-type -requests, or loopback-testing an I2P site as a diagnostic tool. +requests, or loopback-testing an I2P Site as a diagnostic tool. {%- endtrans %}
{% trans -%} -This may be obvious, but join the community. Run I2P 24/7. Start an I2P site about your project. +This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project. Hang out in IRC #i2p-dev. Post on the forums. Spread the word. We can help get you users, testers, translators, or even coders. {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/discussions/naming.html b/i2p2www/pages/site/docs/discussions/naming.html index adcd2a1a..990ae24e 100644 --- a/i2p2www/pages/site/docs/discussions/naming.html +++ b/i2p2www/pages/site/docs/discussions/naming.html @@ -196,7 +196,7 @@ the issues of conflicts and hijacking, however.{% trans -%} Awkward, not real-time: It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers, -I2P site status reporters. +I2P Site status reporters. Jump servers and subscriptions are a pain, it should just work like DNS. {%- endtrans %}
{% trans -%} diff --git a/i2p2www/pages/site/docs/discussions/netdb.html b/i2p2www/pages/site/docs/discussions/netdb.html index 646cfba1..64345e4b 100644 --- a/i2p2www/pages/site/docs/discussions/netdb.html +++ b/i2p2www/pages/site/docs/discussions/netdb.html @@ -161,7 +161,7 @@ the netDb. I2P's netDb is very different from traditional load bearing DHTs - it only carries network metadata, not any actual payload, which is why even a netDb using a floodfill algorithm will be able to sustain an arbitrary amount of -I2P site/IRC/bt/mail/syndie/etc data. We can even do some optimizations as I2P +I2P Site/IRC/bt/mail/syndie/etc data. We can even do some optimizations as I2P grows to distribute that load a bit further (perhaps passing bloom filters between the netDb participants to see what they need to share), but it seems we can get by with a much simpler solution for now. @@ -299,7 +299,7 @@ The code now avoids peers that are shitlisted, failing, or not heard from in half an hour, if possible.
-One benefit is faster first contact to an I2P site (i.e. when you had to fetch +One benefit is faster first contact to an I2P Site (i.e. when you had to fetch the leaseset first). The lookup timeout is 10s, so if you don't start out by asking a peer that is down, you can save 10s. diff --git a/i2p2www/pages/site/docs/how/intro.html b/i2p2www/pages/site/docs/how/intro.html index 27a21aac..aabaf0a2 100644 --- a/i2p2www/pages/site/docs/how/intro.html +++ b/i2p2www/pages/site/docs/how/intro.html @@ -25,7 +25,7 @@ even taken over to attempt more malicious attacks.
{% trans i2ptunnel=site_url('docs/api/i2ptunnel') -%} The network itself is message oriented - it is essentially a secure and anonymous IP layer, where messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP -packets. Some example uses of the network include "I2P sites" (webservers hosting normal web +packets. Some example uses of the network include "I2P Sites" (webservers hosting normal web applications within I2P), a BitTorrent client ("I2PSnark"), or a distributed data store. With the help of the I2PTunnel application, we are able to stream traditional TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people diff --git a/i2p2www/pages/site/docs/how/network-database.html b/i2p2www/pages/site/docs/how/network-database.html index 649eda07..581c355d 100644 --- a/i2p2www/pages/site/docs/how/network-database.html +++ b/i2p2www/pages/site/docs/how/network-database.html @@ -836,7 +836,7 @@ by creating a small number (8-15) of floodfill routers clustered closely in the and distribute the RouterInfos for these routers widely. Then, all lookups and stores for a key in that keyspace would be directed to one of the attacker's routers. -If successful, this could be an effective DOS attack on a particular I2P site, for example. +If successful, this could be an effective DOS attack on a particular I2P Site, for example. {%- endtrans %}
{% trans -%} diff --git a/i2p2www/pages/site/docs/how/tech-intro.html b/i2p2www/pages/site/docs/how/tech-intro.html index f1ae9cd2..2fcf7cde 100644 --- a/i2p2www/pages/site/docs/how/tech-intro.html +++ b/i2p2www/pages/site/docs/how/tech-intro.html @@ -100,7 +100,7 @@ usually a secret. What is hidden is information on what the user is doing, if anything at all, as well as what router a particular destination is connected to. End users will typically have several local destinations on their router - for instance, one proxying in to IRC servers, another supporting the user's -anonymous webserver ("I2P site"), another for an I2Phex instance, another for +anonymous webserver ("I2P Site"), another for an I2Phex instance, another for torrents, etc. {%- endtrans %}
@@ -904,7 +904,7 @@ system. It lets you create information, share it with others, and read posts from those you're interested in, all while taking into consideration your needs for security and anonymity. Rather than building its own content distribution network, Syndie is designed to run on top of existing networks, syndicating -content through I2P sites, Tor hidden services, Freenet freesites, normal websites, +content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie is done so as to offer pseudonymous authentication to anyone reading or archiving it. @@ -945,7 +945,7 @@ be sufficient for some users.{% trans -%} I2PTunnel enables most of the applications in use. An "httpserver" pointing -at a webserver lets anyone run their own anonymous website (or "I2P site") +at a webserver lets anyone run their own anonymous website (or "I2P Site") - a webserver is bundled with I2P for this purpose, but any webserver can be used. Anyone may run a "client" pointing at one of the anonymously hosted IRC servers, each of which are running a "server" pointing at their local @@ -963,7 +963,7 @@ proxies to access the "server" instances pointing at an NNTP server.
{% trans -%} i2p-bt is a port of the mainline python BitTorrent client to run both the tracker and peer communication over I2P. Tracker requests are forwarded through -the eepproxy to I2P sites specified in the torrent file while tracker responses +the eepproxy to I2P Sites specified in the torrent file while tracker responses refer to peers by their destination explicitly, allowing i2p-bt to open up a streaming lib connection to query them for blocks. @@ -1041,7 +1041,7 @@ SMTP and POP3 servers - both the outproxies and inproxies communicate with the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those non-anonymous locations does not give access to the mail accounts or activity patterns of the user. At the moment the developers work on a decentralized -mailsystem, called "v2mail". More information can be found on the I2P site +mailsystem, called "v2mail". More information can be found on the I2P Site {{ postman }}. {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/how/threat-model.html b/i2p2www/pages/site/docs/how/threat-model.html index d3984b6d..aa894e5b 100644 --- a/i2p2www/pages/site/docs/how/threat-model.html +++ b/i2p2www/pages/site/docs/how/threat-model.html @@ -231,7 +231,7 @@ However, the attack is still possible, for example by an observer at a large ISP or an Internet exchange point. Those who want to defend against it would want to take appropriate countermeasures, such as -setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P sites. +setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites. Other countermeasures, such as nontrivial delays and restricted routes, are not currently implemented. {%- endtrans %} @@ -323,7 +323,7 @@ Limits on the number of tunnels routed through a single peer Prevention of peers from the same /16 IP range from being members of a single tunnel {%- endtrans %}{% trans -%} The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'. Otherwise, it forwards the request to a configured HTTP outproxy. -Thus, in practice, all HTTP (I2P site) hostnames must end in the pseudo-Top Level Domain '.i2p'. +Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'. {%- endtrans %}
{% trans i2ptld='https://datatracker.ietf.org/doc/draft-grothoff-iesg-special-use-p2p-names/', @@ -337,7 +337,7 @@ See the specification for details.
{% trans -%} Addressbook will publish the merged hosts.txt to a location -(traditionally hosts.txt in the local I2P site's home directory) to be accessed by others +(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others for their subscriptions. This step is optional and is disabled by default. {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/tunnels/unidirectional.html b/i2p2www/pages/site/docs/tunnels/unidirectional.html index ac252b65..9096bdea 100644 --- a/i2p2www/pages/site/docs/tunnels/unidirectional.html +++ b/i2p2www/pages/site/docs/tunnels/unidirectional.html @@ -82,7 +82,7 @@ The paper's main point is that deanonymizations on unidirectional tunnels take a longer time, which is an advantage, but that an attacker can be more certain in the unidirectional case. Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least -with long-living I2P sites. +with long-living I2P Sites. {%- endtrans %}{% trans -%} @@ -97,7 +97,7 @@ This conclusion is based on an arbitrary certainty vs. time weighting (tradeoff) that may not be applicable in all cases. For example, somebody could make a list of possible IPs then issue subpoenas to each. Or the attacker could DDoS each in turn and via a simple -intersection attack see if the I2P site goes down or is slowed down. So close +intersection attack see if the I2P Site goes down or is slowed down. So close may be good enough, or time may be more important. {%- endtrans %}
diff --git a/i2p2www/pages/site/faq.html b/i2p2www/pages/site/faq.html index 1f9e1a2a..41a27759 100644 --- a/i2p2www/pages/site/faq.html +++ b/i2p2www/pages/site/faq.html @@ -7,20 +7,20 @@wrapper.log
I see an error stating Protocol family unavailable
when I2P is loading{% endtrans %}{% trans -%} -Formerly called an eepSite, an I2P site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. +Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. {%- endtrans %}
@@ -186,13 +186,13 @@ click Shutdown, wait 11 minutes, then start I2P. {%- endtrans %}{% trans eepstatus='http://'+i2pconv('identiguy.i2p') -%} -If you consider every I2P site that has ever been created, yes, most of them are down. -People and I2P sites come and go. -A good way to get started in I2P is check out a list of I2P sites that are currently up. -{{ eepstatus }} tracks active I2P sites. +If you consider every I2P Site that has ever been created, yes, most of them are down. +People and I2P Sites come and go. +A good way to get started in I2P is check out a list of I2P Sites that are currently up. +{{ eepstatus }} tracks active I2P Sites. {%- endtrans %}
{% trans -%} Click on the Website link at the top of your router console for instructions. @@ -251,7 +251,7 @@ yourself from a real threat will take real consideration in any case.{% endtrans
The I2P Addressbook application maps human-readable names to long-term destinations, associated with services, making it more like a hosts file or a contact list than a network database or a DNS service. It's also local-first there is no recognized global namespace, you decide what any given .i2p domain maps to in the end. The middle-ground is something called a "Jump Service" which provides a human-readable name by redirecting you to a page where you will be asked "Do you give the I2P router permission to call $SITE_CRYPTO_KEY the name $SITE_NAME.i2p" or something to that effect. Once it's in your addressbook, you can generate your own jump URL's to help share the site with others.
{% trans %}You cannot add an address without knowing at least the base32 or base64 of the site you want to visit. The "hostname" which is human-readable is only an alias for the cryptographic address, which corresponds to the base32 or base64. Without the cryptographic address, there is no way to access an I2P site, this is by design. Distributing the address to people who do not know it yet is usually the responsibility of the Jump service provider. Visiting an I2P site which is unknown will trigger the use of a Jump service. stats.i2p is the most reliable Jump service.{% endtrans %}
+{% trans %}You cannot add an address without knowing at least the base32 or base64 of the site you want to visit. The "hostname" which is human-readable is only an alias for the cryptographic address, which corresponds to the base32 or base64. Without the cryptographic address, there is no way to access an I2P Site, this is by design. Distributing the address to people who do not know it yet is usually the responsibility of the Jump service provider. Visiting an I2P Site which is unknown will trigger the use of a Jump service. stats.i2p is the most reliable Jump service.{% endtrans %}
{% trans %}If you're hosting a site via i2ptunnel, then it won't have a registration with a jump service yet. To give it a URL locally, then visit the configuration page and click the button that says "Add to Local Addressbook." Then go to http://127.0.0.1:7657/dns to look up the addresshelper URL and share it.{% endtrans %}
@@ -440,7 +440,7 @@ These are described in detail below. 7658clients.config
file.
diff --git a/i2p2www/pages/site/get-involved/develop/applications.html b/i2p2www/pages/site/get-involved/develop/applications.html
index f23447ac..d130cd65 100644
--- a/i2p2www/pages/site/get-involved/develop/applications.html
+++ b/i2p2www/pages/site/get-involved/develop/applications.html
@@ -207,7 +207,7 @@ to and from I2P. At this point in time it lacks UDP support, but UDP support
is planned in the near future. BOB also contains several tools, such as
destination key generation, and verification that an address conforms to
I2P specifications. Up to date info and applications that use BOB can be
-found at this I2P site.
+found at this I2P Site.
{%- endtrans %}
diff --git a/i2p2www/pages/site/get-involved/develop/signed-keys.html b/i2p2www/pages/site/get-involved/develop/signed-keys.html
index 68a751ec..fe5fddbd 100644
--- a/i2p2www/pages/site/get-involved/develop/signed-keys.html
+++ b/i2p2www/pages/site/get-involved/develop/signed-keys.html
@@ -15,7 +15,7 @@ signature for his key.
{% trans -%} -Tip: To find zzz's GPG key, on his I2P site locate the key `0xA76E0BED`, with +Tip: To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155 76BA A76E 0BED`. {%- endtrans %}
@@ -79,7 +79,7 @@ the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155{% trans -%} -Tip: To find Complication's GPG key, on his I2P site locate the key +Tip: To find Complication's GPG key, on his I2P Site locate the key `0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF 2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`. {%- endtrans %}
diff --git a/i2p2www/pages/site/get-involved/guides/new-translators.html b/i2p2www/pages/site/get-involved/guides/new-translators.html index d27e16a2..0e8baf44 100644 --- a/i2p2www/pages/site/get-involved/guides/new-translators.html +++ b/i2p2www/pages/site/get-involved/guides/new-translators.html @@ -120,7 +120,7 @@ There are about 15 files in the i2p.i2p branch that needs translation:apps/routerconsole/jsp/help_xx.jsp
installer/resources/I2P site.help/help/index_xx.html
installer/resources/I2P Site.help/help/index_xx.html
apps/i2ptunnel/locale/messages_xx.po
This How-to is tested with Ubuntu/Debian as well as FreeBSD. -The web server has to be public reachable from all over the world, an I2P site inside I2P can be setup in addition. +The web server has to be public reachable from all over the world, an I2P Site inside I2P can be setup in addition. Also frequent or infrequent attempts to scrape all your reseed files, and of course attacks on your server. The web server doesn't need to listen at default SSL/TLS port 443 - any other port can be used for obfuscation.
diff --git a/i2p2www/pages/site/get-involved/roadmap.html b/i2p2www/pages/site/get-involved/roadmap.html index b6dc8d47..a98deae5 100644 --- a/i2p2www/pages/site/get-involved/roadmap.html +++ b/i2p2www/pages/site/get-involved/roadmap.html @@ -178,7 +178,7 @@ Update onboarding information in router console readme{% trans -%} After upgrading to the new architecture, you'll have to do a little work to get your old I2PTunnel-driven servers running. -Lets walk through a simple example. For an I2P site with the +Lets walk through a simple example. For an I2P Site with the old clientApp configuration, you had: {%- endtrans %}
@@ -18,8 +18,8 @@ old clientApp configuration, you had:
"I2P site"
{% endtrans %}"My I2P site, isn't it pretty?"
{% endtrans %}"I2P Site"
{% endtrans %}"My I2P Site, isn't it pretty?"
{% endtrans %}localhost
80
{% trans -%} -Below is quick copy of aum's I2P site deployment guide. +Below is quick copy of aum's I2P Site deployment guide. {%- endtrans %}
{% trans %}1. - Deploy a local server{%- endtrans %} diff --git a/i2p2www/pages/site/misc/ticket919.html b/i2p2www/pages/site/misc/ticket919.html index f7d095dd..a868fae4 100644 --- a/i2p2www/pages/site/misc/ticket919.html +++ b/i2p2www/pages/site/misc/ticket919.html @@ -11,17 +11,17 @@ with version 0.9.5. Other operating systems are not affected.A change was introduced during the 0.9.5 cycle to allow I2P's configuration files to be edited with the standard
- Windows text editor, Notepad
. This change had the unfortunate side-effect of causing our I2P site migration code to
- fail to run on Windows systems, leading to I2P sites being served from the installation directory. Consequently:
+ Windows text editor, Notepad
. This change had the unfortunate side-effect of causing our I2P Site migration code to
+ fail to run on Windows systems, leading to I2P Sites being served from the installation directory. Consequently:
While no action is required for users that are not hosting an I2P site (or are not using the included Jetty to host an I2P site), it is -recommended to follow this procedure to avoid issues in case you decide to run a Jetty-hosted I2P site in the future. If you are running an -I2P site it is important to follow this procedure prior to upgrading to 0.9.6. +
While no action is required for users that are not hosting an I2P Site (or are not using the included Jetty to host an I2P Site), it is +recommended to follow this procedure to avoid issues in case you decide to run a Jetty-hosted I2P Site in the future. If you are running an +I2P Site it is important to follow this procedure prior to upgrading to 0.9.6.
@@ -46,20 +46,20 @@ I2P site it is important to follow this procedure prior to upgrading to 0.9.6.
You should see something like the following:
- If the path at number 1 in the image above is set to
I2P site/jetty.xml
, the path needs to be updated.
+ If the path at number 1 in the image above is set to I2P Site/jetty.xml
, the path needs to be updated.
Edit
button next to I2P webserver (I2P site). The page will reload to allow the path to be edited as shown below:
+ Edit
button next to I2P webserver (I2P Site). The page will reload to allow the path to be edited as shown below:
Save Client Configuration
button.
%APPDATA%\I2P\I2P site\docroot
.
+ %APPDATA%\I2P\I2P Site\docroot
.
After following the steps outlined above, your I2P site will be served from %APPDATA%\I2P\I2P site\docroot
+
After following the steps outlined above, your I2P Site will be served from %APPDATA%\I2P\I2P Site\docroot
and should be accessible at http://127.0.0.1:7658.