Changes between Version 14 and Version 15 of Content


Ignore:
Timestamp:
Jul 25, 2010 3:31:13 PM (9 years ago)
Author:
anonymous
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Content

    v14 v15  
    4747Edit: Let's try and avoid the whole tubes metaphor. It's really not helpful.
    4848
     49In I2P, everyone running the application helps everyone else, by default, anonymously. In order to hide your identity within the network, you bounce your traffic through other I2P-enabled machines, so your requests to view an I2P website, for example, go indirectly via other I2P machines, or routers. This works in similar fashion to Tor, but unlike Tor, everyone in the network helps everyone else, and you don't expose yourself to external monitoring by passing traffic to the external net. What happens in I2P stays in I2P! Furthermore, unlike Freenet (another P2P darknet implementation), you're not hosting encrypted content for other users, simply relaying their traffic, which from start to finish stays encrypted.
     50
     51Additionally, no special magic is required to be an I2P router.. we implement technology similar to that used by Skype and other peer-to-peer applications to allow you to be part of the network even if you're behind restrictive firewalls or other systems that prevent inbound traffic from directly reaching your computer. No need to port forward on the router or open special ports, although if you can do so, you may see improved performance.
     52
    4953== Supported Applications ==
    5054