Changes between Version 13 and Version 14 of gsoc/application


Ignore:
Timestamp:
Mar 13, 2009 5:37:48 PM (10 years ago)
Author:
Mathiasdm
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v13 v14  
    99 press@i2p2.de
    1010 1. Describe your organization.[[BR]]
    11  The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . [[BR]] While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by any possible adversaries. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] These capabilities are important in a fast-changing society, where some governments wish to censor the internet. The problem with censorship is that it can and is easily abused. I2P provides a way around this problem, for example to help human rights activists. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
     11 The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . [[BR]] While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by any possible adversaries. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] These capabilities are important in a fast-changing society, where some governments wish to censor the internet. The problem with censorship is that it can and is easily abused. I2P provides a way around this problem, for example to help human rights activists. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    1212   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network
    1313   a. Internal anonymous services (websites, e-mail, torrent trackers, irc servers...)