Changes between Version 79 and Version 80 of faq


Ignore:
Timestamp:
Oct 26, 2010 3:05:34 PM (9 years ago)
Author:
darrob
Comment:

fix wiki syntax

Legend:

Unmodified
Added
Removed
Modified
  • faq

    v79 v80  
    1616 * __What is the difference between I2P and Freenet, TOR, JonDoe.__
    1717   * ''duck: do people still know Freenet? couple years ago it was the privacy thing that everybody was aware of. any other (regional) candidates?''
    18    * Let's turn this question on its head and ask what do all of the above have in common? They all support online privacy and anonymity to some degree, though implementation and scope of use vary wildly.
    19 
     18   * Let's turn this question on its head and ask what do all of the above have in common? They all support online privacy and anonymity to some degree, though implementation and scope of use vary wildly.
    2019   * I2P and Freenet share roughly the same goals insofar as their _primary_ purpose is to implement a darknet environment where all communications between users of the system are off-the-radar. Tor and JonDoe (aka Jap) are primarily concerned with anonymized access to the internet at large. Of course, there's overlap in what these software packages provide..
    21 
    2220   * I2P's eepsites (and .i2p domains) are roughly analogous to Tor's .onion sites; I2P provides a basic "outproxy" to browse content on the net, as does Tor, though I2P's implementation is bested by Tor's given the different project goals.
    23 
    2421   * As for Freenet and I2P, both implement darknets and offer similar features, though Freenet's distributed filesystem that conscripts users drives into a shared datapool is different to I2P's conscription of users (I2P routers) to relay packets. *** more clarification needed - dr|z3d ***
    2522
     
    3229   * We cannot absolutely guarantee the saftey of the software; that we use it everyday ourselves here at I2P HQ should indicate a level of confidence.
    3330   * ''duck: splendid stuff, suggest rephrasing to atleast mention privacy / anonymity. safe is too generic.''
    34  
     31
    3532 * __Is my router an "exit node" to the regular Internet? I don't want it to be.__
    36    * No! You're confusing Tor and I2P! By default an I2P installation will only ever route traffic within the network for others, rendering it unmonitorable by your ISP or government. Your ISP may notice that you're connecting over encrypted channels to other machines on the network, but the nature of those communications will be entirely undiscoverable. In I2P teminology, an "exit node" is what we call an "outproxy", or connection to the wider net. It's possible to function as an outproxy in I2P, similar to how exit nodes operate in Tor-land, but that requires manual configuration on the part of the I2P user. 
     33   * No! You're confusing Tor and I2P! By default an I2P installation will only ever route traffic within the network for others, rendering it unmonitorable by your ISP or government. Your ISP may notice that you're connecting over encrypted channels to other machines on the network, but the nature of those communications will be entirely undiscoverable. In I2P teminology, an "exit node" is what we call an "outproxy", or connection to the wider net. It's possible to function as an outproxy in I2P, similar to how exit nodes operate in Tor-land, but that requires manual configuration on the part of the I2P user.
    3734   * By default, everyone on the network participates in the network to help route traffic for other I2P users. We do not configure any user to be an "outproxy" on a default installation, though by default there is an http web proxy to the normal internet (false.i2p), so the only traffic a default I2P installation will route will be for other I2P routers (nodes) within the network, encrypted and anonymous by design.
    38  
     35
    3936 * __What is syndie and is it still active?__
    4037   * Syndie is a distributed, decentralized forum and blogging platform specifically written for I2P. Development is ongoing, but currently the only way to install Syndie is through compiling it yourself from the mtn database. More information can be found at http://syndie.i2p2.de/
     
    4946 * __What crypto is used?__
    5047   * For an overview of I2P's use of cryptography, please refer to:  http://www.i2p2.i2p/how_cryptography.html
    51  
     48
    5249 * __How does I2P bootstrap?__
    5350
     
    6461
    6562 * __Will I2P be able to cope with a huge influx of new users? (Does it scale?)__
    66  
     63
    6764 * __What ports does I2P use?__
    6865   * For connecting your I2P router to the I2P network, and for receiving and sending traffic,  I2P allocates a random port (tcp/udp)on first startup which you can see on http://127.0.0.1:7657/config.jsp. If you don't like that port you can change it on the same page. It's only this externally visible port that most people need to worry about.. if you can open that nominated port on your modem and port forward to your I2P Router, you'll see better performance, but I2P will work regardless.
    6966
    7067 * __I'm behind an http proxy on an academic campus. Will I2P work here?__
     68   * Not currently, no. We're keen to see I2P bypass as many aritifical restrictions to use as possible, so if you're a coder and think you can help facilitate access for people behind proxies, come and introduce yourself on I2P's Developer Channel on IRC.
    7169
    72    * Not currently, no. We're keen to see I2P bypass as many aritifical restrictions to use as possible, so if you're a coder and think you can help facilitate access for people behind proxies, come and introduce yourself on I2P's Developer Channel on IRC.
    73  
    7470 * __What happened to *.i2p.net? What happened to jrandom? Is I2P dead?__
    7571    * jrandom, the original developer of I2P, had to disappear for reasons unknown. Since the original i2p.net domain was registered by him, and he never left a forwarding address, it was impossible to take control of the domain, and so i2p2.de was born. I2P is far from dead; we're seeing much growth on the network, and huge strides being made in the development. I2P is definitely here to stay!
     
    8682
    8783 * __How can I be sure I'm not being spied on?__
    88 
    89     * Buy a tin foil hat, sit in your closet, and turn the computer off now. Don't waste a second, and be sure to clear your cookies!
     84   * Buy a tin foil hat, sit in your closet, and turn the computer off now. Don't waste a second, and be sure to clear your cookies!
    9085
    9186 * __Do they know I will be running I2P? Is running I2P illegal?__
    92  
     87
    9388 * __Is using an outproxy safe? (What are these inproxies and outproxies?)__
    9489   * Inproxies are services which allow users from the regular internet to have a look into the anonymous network of I2P. So ... the opposite of this is an outproxy. An Outproxy allows you to visit websites of the regular internet through the anonymous network of I2P.
     
    108103 * __Criminal Activity (snuff/bestiality/cp/terrorism etc)__
    109104   * Through the provision of a DNS overlay that allows I2P users to map b32 public encryption keys to a memorable .i2p domains, users can have easy to remember domains on I2P for their webservers etc, though it's entirely optional. If a service is made available this way and is seen to contain questionable material, revoking the service's .i2p domain is likely to happen.
    110    * If a service operator chooses not to make his service visible this way, then it's much harder to discover the service, and more or less impossible to shut it down. Similarly, the main torrent tracker on I2P, http://tracker2.postman.i2p also implements some fundamental requirements with regard to content that prohibits certain nefarious types of content including, snuff, gore and child pornography. 
    111  
     105   * If a service operator chooses not to make his service visible this way, then it's much harder to discover the service, and more or less impossible to shut it down. Similarly, the main torrent tracker on I2P, http://tracker2.postman.i2p also implements some fundamental requirements with regard to content that prohibits certain nefarious types of content including, snuff, gore and child pornography.
     106
    112107 * __I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?__
    113108    * Although I2P and Freenet share some characteristics, in I2P you are never obligated to store encrypted files for other users on the network; this is a Freenet feature. In terms of accesssing dubious content, the same rules apply as on the net at large: proceed with caution! ''(This answer needs rephrasing to fit the question.)''
     
    120115    * If you try to access an .i2p site only to be told that the address isn't in your addressbook, further investigate that error page! There are links to subscriptions and other useful tidbits of information intended to make your experience on I2P more enjoyable. Please read and digest these messages!
    121116        * ''darrob: while this is true the official FAQ should offer a real answer nonetheless.''
    122  
     117
    123118 * __My active peers / known peers / participating tunnels / connections / bandwidth vary dramatically over time! Is anything wrong? __
    124 
    125         * Normal behavior. The number of known peers will often show high variations in number. This is perfectly normal in situations where you may go offline due to outage, the nature of your connection etc. When Peers are no longer visible, they're expired. And the longer you stay online, the more peers you're likely to know. It's a social thing, I2P!
     119   * Normal behavior. The number of known peers will often show high variations in number. This is perfectly normal in situations where you may go offline due to outage, the nature of your connection etc. When Peers are no longer visible, they're expired. And the longer you stay online, the more peers you're likely to know. It's a social thing, I2P!
    126120
    127121 * __My router is using too much CPU?!?__
    128 
    129         * What are you running there cowboy? For optimal I2P performance, a Pentium 3 class or above processor is recommended, with at least 256M onboard ram. The faster your declared speed, the more likely you'll be selected to route tunnels for others, so on a fast connection we recommend a P4 class processor or above, ideally multi-core with at least 512MB system ram. It is possible to run I2P on slower kit, some users have reported success on Pentium 1 class hardware with 128MB ram.
    130         * Also note that when I2P starts up, it has to do a lot of work to build tunnels for you local destinations (I2P-based Services), so the first minute or two may be cpu intensive, after which I2P shouldn't be noticable on modern hardware, and it quite modest in use on Pentium 3 class hardware. YMMV.
     122   * What are you running there cowboy? For optimal I2P performance, a Pentium 3 class or above processor is recommended, with at least 256M onboard ram. The faster your declared speed, the more likely you'll be selected to route tunnels for others, so on a fast connection we recommend a P4 class processor or above, ideally multi-core with at least 512MB system ram. It is possible to run I2P on slower kit, some users have reported success on Pentium 1 class hardware with 128MB ram.
     123   * Also note that when I2P starts up, it has to do a lot of work to build tunnels for you local destinations (I2P-based Services), so the first minute or two may be cpu intensive, after which I2P shouldn't be noticable on modern hardware, and it quite modest in use on Pentium 3 class hardware. YMMV.
    131124
    132125 * __My router has very few active peers, is this OK?__
    133  
     126
    134127 * __I can't access regular Internet sites through I2P.__
    135  
     128
    136129 * ''merge these''
    137130   * __I2P is running, but I can't get to my gmail (or other regular websites) .. (https://)__
     
    151144
    152145 * __How do I set up my own eepsite?__
    153 
    154146   * Most of the work is done in that respect. We provide a separate Jetty webserver instance (the I2P Router also runs on Jetty) that is already running locally by default on a new installation, though isn't yet visible to the I2P community. Browse to http://127.0.0.1:7658 and you'll instructions for configuring your webserver which is also your homepage, in effect. Once you start the webserver in the I2P Tunnel Manager, you'll then have a key which you can register for an .i2p domain, or share with others to facilitate access to your new anonymized online presence!
    155147
     
    157149   * There are several reasons for this, not least the overheads placed on network communication by end-to-end encryption. That said, the main reason that I2P is perceived to be slow is the nature of the network itself..
    158150   * Since I2P relies on your upload speeds, or upstream in order to provide service to other users on the network, and the majority of users are running from domestic adsl/cable connections, the speed of service is limited this way. For example, a user with an 8Mbit connection to the network may well only have 256Kb/s upstream; it is the upstream value that determines the speed a given user can offer to the network.
    159  
     151
    160152 * __What do the Active ''x/y'' numbers mean in the router console?__
    161153   * ''x'' is the number of peers you've sent or received a message from successfully in the last minute, ''y'' is the number of peers seen in the last hour or so.
     
    194186
    195187 * __What bandwidth settings do you recommend for my internet connection?__
    196  
     188
    197189=== I2Apps ===
    198190