Changes between Version 16 and Version 17 of gsoc/application


Ignore:
Timestamp:
Mar 13, 2009 8:23:44 PM (10 years ago)
Author:
qbi2p2
Comment:

I fucked up the formatting

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v16 v17  
    99 press@i2p2.de
    1010 1. Describe your organization.[[BR]]
    11 The I2P project aims to extend users privacy by providing an anonymous communication network. It was founded in 2003 and attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.
    12 
    13 I2P uses onion routing (an encryption layer is added for each router messages need to pass) for its anonymous network and is somewhat similar to Tor. The main difference from many other projects is that we try to build a VPN-like network. All traffic and all applications can stay within our network. This allows more resistance against attackers.
    14 
     11The I2P project aims to extend users privacy by providing an anonymous communication network. It was founded in 2003 and attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.[[BR]]
     12I2P uses onion routing (an encryption layer is added for each router messages need to pass) for its anonymous network and is somewhat similar to Tor. The main difference from many other projects is that we try to build a VPN-like network. All traffic and all applications can stay within our network. This allows more resistance against attackers.[[BR]]
    1513I2P is a Java application with almost twohundredthousend lines of code. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    1614   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network