{% extends "global/layout.html" %} {% block title %}{% trans %}Supported Applications{% endtrans %}{% endblock %} {% block content_nav %} {% endblock %} {% block content %}

{% trans trac='https://trac.i2p2.de/report/1' -%} This is intended to be a comprehensive listing of applications used with I2P. If you know of something that's missing please submit a ticket on Trac, and be sure to select the “www” component in the submission form. {%- endtrans %}

{% trans %} Supported applications are tagged with one or more of the following: {%- endtrans %}

{{ _('bundled') }}

{% trans -%} Bundled application — I2P ships with a few officially supported applications that let new users take immediate advantage of some of I2P's more useful capabilities. {%- endtrans %}

{{ _('plugin') }}

{% trans plugins=('stats.i2p/i2p/plugins/') -%} Third-party plugin — I2P's plugin system provides convenient deployment of I2P-enabled applications and allows tighter integration with the router. Plugins are [reviewed by the community](http://{{ plugins }}) to identify security and anonymity issues. {%- endtrans %}

{{ _('standalone') }}, {{ _('standalone/mod') }}

{% trans -%} Third-party standalone application — Many standard network applications only require careful setup and configuration to communicate anonymously over I2P. These are tagged with standalone. Some applications, tagged with standalone/mod, require patching to function properly over I2P or to prevent inadvertent disclosure of identifying information such as the user's hostname or external IP address. {%- endtrans %}

{{ _('service') }}

{% trans -%} Third-party essential network service — Services which on the I2P network are analogous to those provided on the public Internet by hosting providers, ISPs, and Google: eepsite indexes and jump services, search engines, email, DNS-style name services, hosting, proxies, etc. These services focus on boosting the usefulness of the network as a whole, and making network content more discoverable. {%- endtrans %}

{{ _('unmaintained') }}

{% trans -%} Unmaintained — This is used to tag plugins, applications, and services which appear to be unmaintained and may be removed from this listing in the future. {%- endtrans %}

{% trans threatmodel=site_url('docs/how/threat-model') -%} Warning: Using an application, plugin, or service with I2P doesn't automatically protect your anonymity. I2P is merely a set of tools which can help you mitigate certain identified threats to anonymity. We do not and cannot make any guarantees about the safety of the applications, plugins, and services listed below. Most applications and plugins must be properly configured, and some will need to be patched — and even then your anonymity might not be assured. Similarly, services could put your anonymity at risk, either by design or through carelessness on their part or your own. {%- endtrans %}

{% trans -%} If you have doubts about the suitability of an application, plugin, or service for use with I2P, you are urged to inquire about privacy issues with its maintainers, to search its mailing lists and bug tracker if one exists, and consult trusted, knowledgeable members of the I2P community. {%- endtrans %}

{% trans -%} Take responsibility for your own anonymity and safety — always seek expert advice, educate yourself, practice good judgment, be mindful of disclosing personally identifying information, and don't take shortcuts. {%- endtrans %}

{% trans %}Blogging, Forums, and Wikis{% endtrans %}

{% trans %}Decentralized File Storage{% endtrans %}

{% trans %}Development Tools{% endtrans %}

{% trans %}Version control{% endtrans %}

{% trans %}Domain Naming{% endtrans %}

{% trans %}Email{% endtrans %}

{% trans %}File Sharing{% endtrans %}

{% trans %}BitTorrent clients{% endtrans %}

{% trans %}BitTorrent trackers and indexers{% endtrans %}

{% trans zzz=i2pconv('zzz.i2p') -%} For a detailed feature comparison of I2P-enabled trackers/indexers, see here. {%- endtrans %}

ED2K

Gnutella

{% trans %}Network Administration{% endtrans %}

{% trans %}General-purpose socket utilities{% endtrans %}

SSH/SCP/SFTP

{% trans %}Real-time Chat{% endtrans %}

{% trans %}Instant messaging clients{% endtrans %}

{% trans %}IRC clients{% endtrans %}

{% trans -%} Many IRC clients leak identifying information to servers or other clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound and outbound messages to scrub data such as LAN IP addresses, external IP addresses, local hostnames, and the name and version of the IRC client. Two message types in particular, DCC and CTCP, can't be sufficiently anonymized without changes to the protocols or to IRC client/server code, so they are completely blocked, except for CTCP ACTION (the message emitted by the /me command) which isn't inherently dangerous. {%- endtrans %}

{% trans -%} I2P's IRC filtering may not cover every possible leak — users should also check if their client is sending their real name or local username. Packet sniffers such as Wireshark are useful here. Eliminating remaining leaks may be as simple as changing the client's default configuration. If that doesn't help, inform the I2P developers; they may be able to solve it via additional filtering. {%- endtrans %}

{% trans %}IRC servers{% endtrans %}

{% trans %}Web Browsing{% endtrans %}

{% trans %}Anonymous websites{% endtrans %}

{% trans %}Proxy software{% endtrans %}

{% trans %}Inproxies{% endtrans %}

{% trans -%} Gateways allowing users on the public Internet to access eepsites. {%- endtrans %}

{% trans %}Outproxies{% endtrans %}

{% trans -%} Gateways allowing I2P users to access content hosted on the public Internet. {%- endtrans %}

{% trans %}Website Hosting{% endtrans %}

{% trans %}Web servers{% endtrans %}

{% trans -%} In addition to Jetty, any web server should function over I2P without modification so long as it's HTTP-compliant. Some web servers known to currently serve content on the I2P network are: {%- endtrans %}

{% endblock %}