Changes between Version 8 and Version 9 of gsoc/application


Ignore:
Timestamp:
Mar 13, 2009 4:50:14 PM (10 years ago)
Author:
Mathiasdm
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • gsoc/application

    v8 v9  
    99 press@i2p2.de
    1010 1. Describe your organization.[[BR]]
    11  The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by governments and organisations. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
     11 The I2P development team is an international group (with both anonymous and known participants) looking to provide anonymity for internet users through an overlay network. To achieve this goal, I2P uses onion routing (an encryption layer is added for each router messages need to pass) for this goal, somewhat similar to Tor. Multiple applications work directly on the network (web browsing, e-mail, IRC, ...), while others are available by integrating into the I2P API (eg. Bittorrent, iMule ...). [[BR]] The project was formed in 2003. There were eight official releases in 2008, and one so far this year. It has a rapidly growing user base of about 700-1000 users at any time and over 3000 unique users per month. Members of the group attended 25C3 in Berlin in 2008, and will give talks about I2P at Chemnitzer Linux-Tage http://chemnitzer.linux-tage.de/2009/vortraege/detail.html?idx=93 and Pet-Con http://www.pet-con.org/index.php/PET_Convention_2009.1 this month. One of the lead developers recently gave an interview to gulli.com http://www.gulli.com/news/i2p-an-anonymous-network-2009-03-09/ . While somewhat similar to Tor, the project has distinctly different goals. It is focused on the development of a internal network services ("hidden services" in Tor terms) rather than anonymous proxying to the regular internet. This allows more resistance against censorship by any possible adversaries. These I2P services are generally faster and better-suited to anonymous communication than Tor hidden services. [[BR]] I2P is a large and complex Java application with almost 200KLOC. The project will be of interest to those exploring networking, cryptography, distributed databases, multiple transport protocols, anonymity, and debugging widely distributed, networked applications.[[BR]]Amongst the main features of I2P are:
    1212   a. Anonymity for sender and receiver of messages through onion routing and cover traffic provided by the network
    1313   a. Internal anonymous services (websites, e-mail, torrent trackers, irc servers...)
    1414   a. Multiple programs using the I2P API to provide extra services (anonymous blogging software, torrent applications
     15   a. By default, users route traffic for each other, which adds cover traffic to the network, improving the anonymity of the users and the capacity of the network.
    1516 1. Why is your organization applying to participate in GSoC 2009? What do you hope to gain by participating?[[BR]]
    1617 Multiple developers work on the I2P project, but we would like to get some extra people involved. As I2P is an anonymity and security project, it's important for us to get a lot of peer review ('many eyeballs'-principle). Extra developers would also allow an increased focus on less 'evolved' parts of the project.