Changes between Version 17 and Version 18 of gsoc/application


Ignore:
Timestamp:
Mar 13, 2009 8:27:37 PM (10 years ago)
Author:
qbi2p2
Comment:

now it should OK

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v17 v18  
    99 press@i2p2.de
    1010 1. Describe your organization.[[BR]]
    11 The I2P project aims to extend users privacy by providing an anonymous communication network. It was founded in 2003 and attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.[[BR]]
    12 I2P uses onion routing (an encryption layer is added for each router messages need to pass) for its anonymous network and is somewhat similar to Tor. The main difference from many other projects is that we try to build a VPN-like network. All traffic and all applications can stay within our network. This allows more resistance against attackers.[[BR]]
    13 I2P is a Java application with almost twohundredthousend lines of code. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
     11 The I2P project aims to extend users privacy by providing an anonymous communication network. It was founded in 2003 and attracted several thousand users so far. The development work is done by an international group (with both anonymous and known participants). We coordinate over IRC or discussion in a forum.[[BR]]
     12 I2P uses onion routing (an encryption layer is added for each router messages need to pass) for its anonymous network and is somewhat similar to Tor. The main difference from many other projects is that we try to build a VPN-like network. All traffic and all applications can stay within our network. This allows more resistance against attackers.[[BR]]
     13 I2P is a Java application with almost twohundredthousend lines of code. The encryption routines are implemented in optimised C and Assembly to ensure the best possible speed. Sophisticated peer selection/routing algorithms balance speed, anonymity and protection against DoS attacks to allow for the best and safest possible experience. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    1414   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network
    1515   a. Internal anonymous services (websites, e-mail, torrent trackers, irc servers...)