Content: content_RN.txt

File content_RN.txt, 3.9 KB (added by ReturningNovice@…, 9 years ago)
Line 
1''Note: Please don't directly edit this content, but rather add your ammendments underneath the text in question, or in (brackets) next to the word or sentence you think to improve so we don't end up treading on each others toes. Feel free to attribute edits to yourself, to further clarify who's doing what.''
2
3
4
5
6= HOMEPAGE =
7
8
9== What IS I2P? ==
10
11
12I2P, otherwise known as the Invisible Internet Project, is a full darknet implementation that runs on Java and is therefore available anywhere Java will run, including desktops, embedded systems and cellphones.
13
14
15What is a darknet, you ask? It's a network within a network, unmonitorable[untraceable (RN)] by your ISP or government, providing, in the case of I2P, anonymous access to a broad raft[range (RN)] of services including websites, chat networks, and peer-to-peer filesharing [file-sharing (RN)] facilities.
16
17
18== What can I2P do for you? ==
19
20
21The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously on I2P. Though suitable for general privacy-conscious usage, I2P is also designed to protect users under high risk, such as:
22
23
24    * Activists
25    * Marginalized groups
26    * Victims of ethnic, political, or religious persecution
27    * Journalists
28    * Whistleblowers
29    * More use cases…
30
31
32== Try I2P now ==
33(download link)
34
35
36= I2P =
37
38
39== How does I2P work? ==
40
41
42Tubes
43
44
45It’s a series of tubes…
46
47Edit: Let's try and avoid the whole tubes metaphor. It's really not helpful.
48[EDIT: remove above 7 lines (RN)]
49
50In I2P, everyone running the application helps everyone else, by default, anonymously. In order to hide your identity within the network, you bounce your traffic through other I2P-enabled machines, so your requests to view an I2P website, for example, go indirectly via other I2P machines (known as routers in I2P terminology, or nodes in Tor terms). This works in similar fashion to Tor, but unlike Tor, everyone in the network helps everyone else, and you don't expose yourself to external monitoring by passing traffic to the external net. What happens in I2P stays in I2P! [** please clarify last line: some i2p sites can be seen from outernet via adding .to to the end (RN)] Furthermore, unlike Freenet (another P2P darknet implementation), you're not hosting encrypted content for other users, simply relaying their traffic, which from start to finish stays encrypted.
51
52Additionally, no special magic is required to be an I2P router.. we implement technology similar to that used by Skype and other peer-to-peer applications to allow you to be part of the network even if you're behind restrictive firewalls or other systems that prevent inbound traffic from directly reaching your computer. No need to port forward on the router or open special ports, although if you can do so, you may see improved performance.
53
54== Supported Applications ==
55
56
57    * Email - Integrated web mail interface, decentralized email plugin
58    * Web browsing - Anonymous websites, gateways to and from the public Internet
59    * Blogging and forums - Blogging plugins, Syndie support
60    * Website hosting - Integrated web server
61    * Real-time chat - Instant messaging and IRC
62    * File sharing - ED2K and Gnutella clients, integrated BitTorrent client
63    * Decentralized file storage - Tahoe-LAFS
64    * More supported applications…
65
66Edit:
67
68
69    * An "in-house" DNS system which permits easy, free registration of .i2p domains, and also facilitates (non-anonymous) access to those without I2P installed, via our "inproxy" system.
70    * I2P provisions its own plugin system, which allows those with some coding experience to augment I2P's native features with their own. Existing plugins include an IRC client, a blogging platform, an open bittorrent tracker, a peer-to-peer mail system and an I2P implementation of Gnutella's peer-to-peer filesharing system.