Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

News

Browse anonymously with I2P 

Discover I2P, the anonymous network for secure browsing and communication. A complete guide on installation, configuration, and uninstallation.

I2P (Invisible Internet Project)

Table of contents

  • I2P: what it is and how it works 
  • What is I2P and what it is used for
  • How to install I2P 
  • How to uninstall I2P 

I2P: what it is and how it works 

In the age of digital surveillance, maintaining online privacy is becoming increasingly difficult. Every action on the internet leaves traces that can be monitored by ISPs, corporations, and governments.

For those seeking a secure and anonymous alternative, I2P (Invisible Internet Project) is a powerful solution. This article explores how this decentralized network works, how to install it, configure it, and, if needed, uninstall it. 

What is I2P and what it is used for

An architecture built for privacy 

Unlike traditional networks that rely on centralized servers and public nodes, I2P is a closed and decentralized network designed to ensure anonymity and security in online communications.

Its architecture is based on a series of encrypted, unidirectional tunnels, making it impossible to trace the path of data from sender to recipient. 

While the Tor network allows users to browse the clearnet (the regular web) anonymously through a system of public relays, I2P is built to host internal services known as eepsites (equivalent to Tor’s .onion sites).

These anonymous sites are only accessible within the network and are distributed in a decentralized manner using a network database (NetDB)

The role of garlic routing 

One of the key components of I2P is its routing mechanism called garlic routing.

This system is an evolution of the more widely known onion routing, used by Tor, but with a fundamental difference: while onion routing encapsulates a single message within multiple layers of encryption (like an onion), garlic routing bundles multiple encrypted messages together before transmitting them through the network. 

Garlic routing provides several advantages: 

  • Enhanced anonymity
    Data packets are fragmented and routed through random paths, making it impossible to determine the sender and recipient. 
  • Reduced latency
    By combining multiple messages into a single transmission, the network processes fewer packets, improving efficiency. 
  • Increased resistance to censorship
    Distributing packets across multiple routes makes it harder for attackers to block or analyze network traffic. 

Unidirectional tunnels for superior security 

Another essential feature of I2P is its use of unidirectional tunnels for routing data. Every user connecting to the network establishes two pairs of tunnels: 

  • Outbound tunnels
    Used to send data to a destination. 
  • Inbound tunnels
    Used to receive data from other nodes. 

This separation ensures that an attacker cannot trace the entire path of a packet, making it significantly more secure than the bidirectional circuits used by Tor. 

Eepsites: the hidden Web of I2P 

Eepsites are the backbone of the I2P ecosystem. These are anonymous websites accessible only within the network, using a .i2p domain. Since they are not indexed by traditional search engines, eepsites provide a secure space for private forums, anonymous blogs, alternative marketplaces, and file repositories. 

To access eepsites, users must configure their browser with a local proxy or use an optimized browser like I2P+ Browser, which includes built-in support for the anonymous network. 

Practical uses of I2P 

Due to its advanced architecture, I2P is widely used for various privacy and security applications: 

  • Anonymous messaging
    Services like I2P-Bote allow users to send encrypted and censorship-resistant emails. 
  • Secure file sharing
    With I2PSnark (a BitTorrent client optimized for I2P), users can share files anonymously without exposing their IP address. 
  • Access to decentralized services
    Projects like Syndie enable the hosting of anonymous forums and blogs. 
  • Encrypted communication
    Integration with tools like Ricochet facilitates peer-to-peer secure chat. 
I2P and online security

How to install I2P 

The installation of I2P is relatively straightforward, but the process varies depending on the operating system. Below is a comprehensive guide for Windows, Linux, and macOS, along with some tips for optimal configuration. 

Installing I2P on Windows 

On Windows, installing I2P is similar to any other software: 

  1. Download the installation package from the official I2P website: https://geti2p.net
  1. Run the .exe file and follow the setup wizard. During installation, you can choose the destination folder and whether to start I2P automatically when the computer boots. 
  1. Complete the installation and start the I2P Router service. 
  1. Access the configuration console by opening a browser and navigating to http://127.0.0.1:7657/

After installation, it’s recommended to configure the Windows firewall to allow I2P traffic, preventing potential connection issues. 

Installing I2P on Linux 

On Linux, the installation method depends on the distribution. Most Debian– or Ubuntu-based systems support installation via APT

bash 

sudo apt update   

sudo apt install i2p

Once installed, the service does not start automatically. To start it manually: 

bash 

i2prouter start

To enable it to start automatically at boot: 

bash 

sudo systemctl enable i2p   

sudo systemctl start i2p

For Arch Linux users, I2P can be installed from AUR (Arch User Repository) using a helper like yay

bash 

yay -S i2p

On Fedora and other RPM-based distributions, installation is done through DNF

bash 

sudo dnf install i2p

After installation, access the configuration console via http://127.0.0.1:7657/

Installing I2P on macOS 

On macOS, the easiest way to install I2P is through Homebrew, the popular package manager for Mac. Before starting, ensure Homebrew is installed. If not, run: 

bash 

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

Then, install I2P with: 

bash 

brew install i2p   

After installation, start the service: 

bash 

i2prouter start   

To access the configuration console, open a browser and go to http://127.0.0.1:7657/.

To set I2P to start automatically at boot, use: 

bash 

brew services start i2p

First steps after installation 

After installing I2P, it’s essential to complete a few configurations: 

  • Check connectivity
    In the configuration console, ensure I2P is correctly connected to the network. Initial connections may take a few minutes. 
  • Configure the firewall
    If using a firewall or VPN, make sure I2P’s ports are not blocked. 
  • Optimize performance
    The console allows you to adjust bandwidth usage to prevent slowing down your main internet connection. 
  • Set up the browser
    To access eepsites and browse anonymously, configure a local proxy or use an optimized browser like I2P+ Browser

Once these steps are complete, I2P will be ready for secure and anonymous use. 

Configuring I2P for anonymous browsing 

Once I2P is installed, the browser must be configured to access internal services and anonymous websites. The most effective method is setting up a local proxy for HTTP and HTTPS traffic. Most users opt for Firefox, which allows manual network settings adjustments. 

Under “Network Settings,” select “Manual proxy configuration” and enter the following: 

  • HTTP Proxy: 127.0.0.1 
  • Port: 4444 
  • SOCKS Proxy: 127.0.0.1 
  • Port: 4445 

Alternatively, preconfigured browsers like I2P+ Browser simplify access to the anonymous network. 

In addition to browsing, I2P can be configured for BitTorrent clients, anonymous emails, and encrypted chats to maximize privacy. 

How to uninstall I2P 

If I2P needs to be removed, follow the standard procedure for the operating system. 

On Windows, it can be uninstalled via the Control Panel. On Linux, use: 

bash 

sudo apt remove --purge i2p

On macOS, run: 

bash 

brew uninstall i2p

It is also recommended to manually delete residual configuration files to prevent any traces of the software from remaining on the system. 

Conclusion 

I2P is a powerful solution for those seeking online anonymity and security. While it requires a more advanced setup compared to Tor, it offers superior protection for private communications.

Installing and properly configuring it allows access to an anonymous and decentralized ecosystem, helping users safeguard their privacy in an increasingly monitored world. 


Questions and answers

  1. Is I2P legal? 
    Yes, I2P is a legal tool, but its usage may have legal implications depending on the activity. 
  2. Is I2P safer than Tor? 
    It depends on the use case. I2P is better for internal anonymous communication, while Tor is designed for anonymous web access. 
  3. Can I use I2P for file sharing? 
    Yes, I2P supports BitTorrent clients like I2PSnark, which offer enhanced privacy for file transfers. 
  4. How fast is I2P compared to the regular internet? 
    Since I2P is an encrypted and decentralized network, it is slower than the regular internet but provides greater security. 
  5. Can I access the Dark Web with I2P? 
    I2P has its own ecosystem of anonymous sites (eepsites) but is not designed to access Tor services or the traditional Dark Web. 
  6. Which browsers are compatible with I2P? 
    Firefox is the most commonly used, but there are optimized options like I2P+ Browser. 
  7. Does I2P protect against malware? 
    No, I2P ensures anonymity but does not prevent the download of malicious files. Using an antivirus is always recommended. 
  8. Can I use I2P on Android? 
    Yes, there is an app called I2P Android that allows mobile access to the network. 
  9. Do I need a VPN with I2P? 
    A VPN is not necessary, but it can add an extra layer of anonymity, especially when accessing the regular internet. 
  10. How anonymous is I2P? 
    I2P offers a high level of anonymity, but no system is perfect. Following best privacy practices is essential. 
To top