Settings

Theme

Invisible Internet Project (I2P)

geti2p.net

95 points by benji_is_me 5 years ago · 24 comments

Reader

bilegeek 5 years ago

Why don't pirates switch to I2P? I know it's slow, but doesn't the speed go up the more high-bandwidth users and relay operators there are? Or am I missing something? Is it just inertia that's keeping everybody on non-I2P-routed BitTorrent?

  • cookiengineer 5 years ago

    The issue I have with i2p is that it enforces all clients to be exit nodes, too. It makes the peer system stronger, but also legally vulnerable.

    [update: this isn't true anymore, there's a config flag now available that fixes this and outproxy=false is defaulted. See [1]]

    [1] https://geti2p.net/en/faq#exit

    • brokenkebab 5 years ago

      The issue I have with i2p is that it enforces all clients to be exit nodes, too

      This is not true. Seriously, you could at least read i2p faq before explaining other people how it works.

    • MertsA 5 years ago

      This wasn't true in the past either. I2P would share bandwidth with other nodes, but not out to the public internet. It was always built as an anonymous network with various services hosted in it. Basically it's like a stripped down robust version of Tor that only has hidden services. HTTP proxies to the public internet are just a hidden service essentially. Unless you chose to set up one yourself it never just allowed random I2P nodes to proxy out to the public internet through your connection.

    • fulafel 5 years ago

      Even if you were an exit node (see sibling), is this really so? Have eg Tor exit nodes been held legally responsible for eg copyright infringement? Sounds highly counterintuitive.

jtbayly 5 years ago

I’d like some comparison to Tor, which I’m somewhat familiar with. Can anybody help me out?

  • krackers 5 years ago

    Protocol-wise they're pretty similar except I2P uses a variant of onion routing called "garlic routing" which allows for message bundling (I don't know if this is currently used beyond bundling for delivery status messages and lease sets). I2P also has unidirectional circuits as opposed to Tor's bidirectional ones which means unlike Tor hidden services where you build a bridged circuit using a rendezvous point, in I2p each side has a pair of unidirectional tunnels for send/receive. I2P is also packet switched as opposed to circuit-switched, which can possibly make it more resilient to traffic-analysis attacks and lead to better load balancing of resources.

    Otherwise the main differences seem to be design-wise, where in Tor you rely on a centralized bootstrap to get the list of relays whereas I2P does this via decentralized NetDb.

  • rficu 5 years ago
  • tenebrisalietum 5 years ago

    Roughly it's like Tor (though I think the transport is not necessarily like Tor), except it's closed. You can only communicate with others on the I2P network. Some I2P users may choose to operate an "outproxy" and provide Internet access but it's not built into the network or software. What is (or was, it's been awhile) built in is a torrent client.

    It's also written in Java and the router web UI was pretty snazzy from what I remember.

    • gary_0 5 years ago

      The design is also more decentralized than Tor. It's also been a while, but I think the client runs a router node by default. This provides extra anonymity, because your own traffic is hidden in the other traffic you're routing. As I recall, the security/performance tweaks in the Web UI allowed you to set how much traffic you allowed through your node.

      • schoen 5 years ago

        > This provides extra anonymity, because your own traffic is hidden in the other traffic you're routing.

        Tor's take on the common proposal to do this is at

        https://2019.www.torproject.org/docs/faq.html.en#BetterAnony...

        and notes this threat model issue:

        > There are some cases where it doesn't seem to help: if an attacker can watch all of your incoming and outgoing traffic, then it's easy for them to learn which connections were relayed and which started at you. (In this case they still don't know your destinations unless they are watching them too, but you're no better off than if you were an ordinary client.)

        (I'm not mentioning this to criticize I2P's design, just to point out that the benefit you get from this decision depends a lot on your threat model!)

    • osgovernment 5 years ago

      There is a C++ implementation that is pretty nice:

      https://github.com/PurpleI2P/i2pd

  • timbit42 5 years ago

    Unlike Tor, I2P supports UDP which lets you use bittorrent, but since I2P doesn't have exit nodes, you can only bittorrent with others on I2P.

m463 5 years ago

I think it would be cool to have sort of... Call it IFN - invisible family network or many VFLAN - virtual Family LAN.

Some way of networking just your family members.

thewebcount 5 years ago

How does one find services available on I2P?

  • benji_is_meOP 5 years ago

    There's a few I2Psites that track other I2Psites (and share hosts.txt files). You can subscribe to these (attaching *.i2p domains to their respective long base32 links). By default stats.i2p and a few others are in your address book.

    There used to be some I2P-only search engines but I'm not sure if they exist anymore.

adrianN 5 years ago

Can someone summarize the differences between I2P and Freenet?

  • MertsA 5 years ago

    I2P is basically just an anonymous network layer. It doesn't store files, proxy to the internet, run a web server, etc. All it does is anonymously connect standard servers and clients.

    Freenet on the other hand is an anonymous content distribution system. You can't use it to connect arbitrary network services together, it's only good for storing and retrieving files. Nodes on Freenet each store encrypted pieces of data but it's computationally hard to figure out what data a particular node is storing unless you have the key to access it. Files are prioritized based on popularity so old files that no one has accessed in a while and the original host is gone can just be lost forever. It's similar in some ways to bittorrent swarms. Over time as a torrent becomes less and less popular you're likely to run into issues finding a seeder that's still around.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection