Changes between Version 12 and Version 13 of gsoc/application


Ignore:
Timestamp:
Mar 13, 2009 5:08:28 PM (10 years ago)
Author:
Mathiasdm
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v12 v13  
    99 press@i2p2.de
    1010 1. Describe your organization.[[BR]]
    11  The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . [[BR]] While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by any possible adversaries. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] These capabilities are important in a fast-changing society, where some governments wish to censor the internet. The problem with censorship is that it can and is easily abused. I2P provides a way around this problem, for example to help human rights activists. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
     11 The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . [[BR]] While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by any possible adversaries. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] These capabilities are important in a fast-changing society, where some governments wish to censor the internet. The problem with censorship is that it can and is easily abused. I2P provides a way around this problem, for example to help human rights activists. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    1212   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network
    1313   a. Internal anonymous services (websites, e-mail, torrent trackers, irc servers...)
     
    1515   a. Multiple programs using the I2P API to provide extra services (anonymous blogging software, torrent applications,
    1616   a. By default, users route traffic for each other, which adds cover traffic to the network, improving the anonymity of the users and the capacity of the network.
     17   a. Development of applications on top of I2P in any programming language, due to a simple socket interface for programs.
    1718   a. An easy and user-friendly install, so anyone can be anonymous without too much trouble.
    1819 1. Why is your organization applying to participate in GSoC 2009? What do you hope to gain by participating?[[BR]]