Version 3 (modified by anonymous, 9 years ago) (diff)

Echelon's Guide to I2P, v0.3

for all users

After a while on I2P and a lot of time in #i2p-chat I saw more help and information is needed for the users of I2P.Til the official homepage is redone this guide will show you basic information and extendend knowledge to use and understand I2P better. I2P

I2P is a solution to provide anonymous communication in the non-anonymous internet. To accomplish that goal it uses different techniques like encryption and routing data via other users of I2P.

  • Preface - important to read
  • General information
  • Router information - description of the leftern menu
  • Head menu - description of the head menu
  • Bandwidth - basic information for bandwidth settings
  • Configuration - overview over all configuration pages
  • iMule - tips and tricks to iMule


Facts that you must know about I2P

  1. There is NO 100% anonymity!

I2P just tries to reach as near as it could get up to 100% and still be useable by the users.

  1. I2P does not hide the fact you run I2P (it does NOT hide the IP address)!

I2P tries to get rid of the binding IP-destination (service). E.G. you could see all the IPs of the users who run I2P and you get the so called "destination ID" of a service. But you cannot determine which user (which IP or router) runs which destination.

  1. Building up this anonymity costs bandwidth!

Although I2P is P2P friendly you will hardly get faster speeds than 20-40 kb/sec on a single connection. Thats due to the fact of I2P techniques of being anonymous. Do not expect RAW line speeds on I2P!

  1. The I2P net is very dynamic.

If you get decent speed for a download right now, it will change the next 10 minutes. Users join and leave - the more users share bandwith to I2P, the better the experience for each of them will be.

  1. I2P needs special adapted software!

As basicly all existant software is not aware of anonymity (e.g. browsers send out their version and other information to the internet), I2P needs special adapted software. There is already a wide bunch of adapted software available to be used within I2P (look on my eepsite).

  1. I2P is closed-network!

The I2P team (which is not payed for the job it does) does not want to burden the risk of being a outproxy into the usual internet upon every user of I2P. E.g. the risk of being a open proxy for spam emails or DOS attacks of websites or other users browsing illegal webpages through their router. Thats why I2P works ONLY in its own network. You cannot get P2P data from usual network/trackers/webpages.

Attachments (3)

Download all attachments as: .zip