Changes between Version 30 and Version 31 of gsoc/application


Ignore:
Timestamp:
Mar 14, 2010 2:06:52 PM (9 years ago)
Author:
zzz
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v30 v31  
    33 I2P
    44 1. '''Description.'''[[BR]]
    5  The I2P project aims to extend users privacy by providing an anonymous communication network. It was founded in 2003 and attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.[[BR]]
     5 The I2P project aims to extend users' privacy by providing an anonymous communication network. It was founded in 2003 and has attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.[[BR]]
    66 I2P uses onion routing (an encryption layer is added for each router messages need to pass) for its anonymous network and is somewhat similar to Tor. The main difference from many other projects is that we try to build a VPN-like network. All traffic and all applications can stay within our network. This allows more resistance against attackers.[[BR]]
    7  I2P is a Java application with almost two hundred thousand lines of code. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
     7 I2P is a Java application with almost two hundred thousand lines of code. The encryption routines are implemented in optimized C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    88   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network
    9    a. Internal anonymous services (websites, e-mail, torrent trackers, irc servers...)
     9   a. Internal anonymous services (websites, e-mail, torrent trackers, IRC servers...)
    1010   a. An active project, with regular releases worked on by multiple developers. A growing project as well, with increasing numbers in both developers and users.
    1111   a. Multiple programs using the I2P API to provide extra services (anonymous blogging software, torrent applications,