![]() Let's start with a visit to the download page to grab the Windows binary or source code, if needed. In fact, you can even tunnel your torrent downloads! Step 1 Download I2P You also have the ability to tunnel TCP/IP based applications (IRC, Jabber, steaming music, etc.) through the network. All messages passing through a tunnel are encrypted by the tunnel gateway to the tunnel endpoint, and undergo inter-router transport layer encryption along the way. I2P is not 100% secure, as nothing is 100% secure, but using it will provide you with meaningful security nonetheless.Ĭontent sent over I2P is encrypted through three-layer garlic encryption, used to verify the delivery of the message to the recipient. ![]() To deal with a wide range of attacks, I2P is fully distributed with no centralized resources- hence there are no directory servers keeping statistics regarding the performance and reliability of routers within the network. I2P initially began in 2003 as a proposed modification to Freenet. But if you are looking to expand your options for secure communication, then enter I2P! This article will show you how to obtain and set up I2P, and in the process, we will also configure an IRC client to access the IRC2P network and get you up and running. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P.įor a web browsing proxy and hidden services host, Tor gets the job done well. In the last article, we left off with the Tor network and its hidden services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |