Files
i2p.www/pages/home.html

24 lines
1.3 KiB
HTML

<p><b>Latest version:</b><br />
2006-01-12 - 0.6.1.9 -
<a href="http://dev.i2p.net/pipermail/i2p/2006-January/001249.html">Announcement</a>
- <a href="download">Download</a>
</p>
<p><b>Weekly updates:</b><br />
2006-02-14 <a href="meeting168">meeting logs</a> and <a
href="http://dev.i2p.net/pipermail/i2p/2006-February/001260.html">status notes</a></p>
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
<p>Anonymity is not a boolean - we are not trying to make something
"perfectly anonymous", but instead are working at making attacks more and more
expensive to mount. I2P alone is what could be called a "low latency mix network",
and there are limits to the anonymity offered by such a system, but the applications
on top of I2P, such as <a href="http://syndie.i2p.net/">Syndie</a>, I2P mail,
and I2PSnark extend it to offer both additional functionality and protection.</p>
<p>I2P is still a work in progress, and should only be used for testing or
development purposes prior to the 1.0 release. Further releases beyond that
will add support for more hostile adversaries.</p>