The Invisible Internet Project

1926 readers
2 users here now

I2P Community Edition

This isn't the official I2P channel, if you want go there then you can find it in the links below.

Rules

"Don't be a dick" - Wil Wheaton

General

Media:

File Hosting and Pastebins

Torrents

Social Networks and Microblogging

Exploring I2P

I2P Name Registries

Search engines

IRC

Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.

Syndie

An open source system for operating distributed forums in anonymous networks

Inproxies

You can use inproxies to surf the I2P network without having to have an I2P router.

Follow us on Twitter

founded 2 years ago
MODERATORS
1
1
FAQ (lemmy.world)
submitted 2 years ago* (last edited 2 years ago) by CAVOK@lemmy.world to c/i2p@lemmy.world
 
 

The Invisible Internet Project (I2P) is a network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user’s traffic and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world.

The Invisible Internet Project began in 2002 and has been active since that time.

How Does I2P Protect Me?

The server is hidden from the user and the user from the server. All I2P network traffic is internal to its network. Traffic inside the I2P network does not interact with the Internet directly. It is a layer on top of the Internet.Encrypted unidirectional tunnels are used between you and your peers to send traffic. No one can see where that traffic is coming from, where it is going, or what the contents are. Additionally I2P transports offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.

Distribution All traffic on the I2P network is encrypted. An observer cannot see a message’s contents, source, or destination. All traffic you route as a participant is internal to the I2P network, you are not an exit node. The network does not do distributed storage of its content ( like Freenet or IPFS). By participating as a node you are not storing content for anyone.If there are hidden services which you dislike, you may refrain from visiting them. Your router will not request any content without your specific instruction to do so.

Is Using I2P Dangerous?

The I2P network is an overlay network. There are no dangers in using an overlay network. If you are engaging activities that are illegal or dangerous on the internet, that does not change if you are using an overlay network.

Regarding using overlay networks, the Java implementation includes a “Strict Countries List” that is used to decide how I2P routers should behave within regions where applications like I2P may be limited by law. For example, while no countries that we know of prohibit using I2P, some have broad prohibitions on participating in routing for others. Routers that appear to be in the “Strict” countries will automatically be placed into “Hidden” mode.

When a router is placed into hidden mode, three key things change about its behavior. It will no longer publish a routerInfo to the NetDB, it will no longer accept participating tunnels, and it will reject direct connections to routers in the same country that it is in. These defences make the routers more difficult to enumerate reliably, and prevent them from running afoul of restrictions on routing traffic for others.

OPSEC Keep track of what profiles you maintain and what services you interact with no matter what network you use. Perform personal risk assessments. The I2P Java software ships with very good defaults for hops for privacy without sacrificing performance.

What About “De-Anonymizing” Attacks? Reducing anonymity is typically done by: A) identifying characteristics that are consistent across identities or B) identifying ephemeral characteristics of repeated connections.

Attacks on I2P in the past have relied on correlating NetDB storage and verification. By randomizing the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity, thereby limiting the utility of that data point. Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P, hosting or using I2P services, it is the responsibility of the user to consider their threat model.

How Do I Connect To the I2P Network?

The core software (Java) includes a router that introduces and maintains a connection with the network. It also provides a handful of applications and configuration options to get you started and personalize your experience.I2Pd is a C++ implementation of the I2P protocol. When using I2Pd you will need to edit configuration files, with Java I2P you can do it all within a user interface.

What Can I Do On The I2P Network?

The network provides an application layer that allows people to use and create familiar apps for daily use. Additionally, the network has its own unique DNS so that you can self host or mirror content on the network. The I2P network functions the same way the Internet does. The Java software includes a BitTorrent client, and email as well as a static website template. Other applications can easily be added to your router console.

What Is the Best OS To Use?

The I2P core software is cross platform. The best OS to use is the one that you feel most comfortable using.

Do I Have To, Or Should I Use I2P in Qubes or Whonix? Am I Not Safe If I Use Something Else?

This depends on your personal threat model. Generally speaking, I2P in Qubes or Whonix are very strong security measures. You can usually use the I2P software with a Firefox or Chromium browser without worry.

It is more important to exercise caution with who you communicate with and how. If you’re doing something that attracts the attention of people with the time and energy to carry out massive, scaled up attacks or sophisticated zero-day attacks, then something extremely thorough like Qubes is an option. On the other hand, if you’re just hosting your blog or surfing I2P sites, then chances are you’re fine just using the OS you’re most comfortable with. The real answer is conscientiousness, don’t say anything you’re not comfortable with somebody repeating.

I Can See My IP Address?

Yes, this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. While the fact that your computer runs I2P software is public, nobody can see your activities in the network. For instance, you cannot see if a user behind an IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the network.

Firewalled Status?

A firewalled I2P router can still access the I2P network. However, if you want to provide extra capacity to the network, it is necessary to open ports.Open I2P’s port on your modem, router and/or firewall(s) for better connectivity (ideally both UDP and TCP).For more information about Port Forwarding: https://portforward.com/

Browsing Functions in I2P

A properly configured browser supports accessing content on the I2P network ( I2P sites and services ) and accessing clearnet content via the outproxy service specified in the Hidden Services Manager of the I2P router.

Instruction for configuring a browser are outlined here: https://geti2p.net/en/about/browser-config .

There is also a Firefox based extension ( I2P in Private Browsing Mode ) that can be found in the the new experimental Windows installer, or can be added directly from here: https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/

Does It Matter What Browser Is Used To Access Content On the I2P Network?

Yes and no. Technically, you can use any browser that has support for proxies. However, some browsers are more secure than others. Also, depending on the browser, it may be more difficult to set up a proxy.

What Browser Should I Use For I2P on Android?

In principle, any browser works, but Privacy Browser is the easiest to set up because it has pre-configured proxy settings for I2P. Instruction can be found here: https://github.com/eyedeekay/Configuring-Privacy-Browser-for-I2P-on-Android#configuring-privacy-browser-for-i2p-on-android

Is It Possible To Install I2P Software on an iPhone?

This is currently not possible without increased effort. If you are tech savvy you can take a look at https://i2pd.readthedocs.io/en/latest/devs/building/ios/. Currently there is no official I2P app available.

What Does It Mean When I See That My I2P Router Needs To Be Integrated Into The Network?

An I2P router needs a few minutes to connect to the network. Sometimes it can take up to an hour.

How Can I tell If The I2P Proxy Is Ready?

You can go to 127.0.0.1:7657/tunnelmgr, if the status of “I2P HTTP Proxy” is green, the proxy is ready and you should be able to surf.

I Cannot Reach I2P Sites

If your router is running and you have shared clients and a browser configured, or are using I2P In Private Browsing Mode and see a proxy ready indicator, check the I2P project website using the link found in /home in the router console. If you can reach that site, then you know that your connection is good and browser is working. If you cannot reach a specific site, please realize that we cannot help you with that.

How Do I Activate the SAM Bridge?

To enable the SAM API: go too http://127.0.0.1:7657/configclients. Find the menu item called “SAM application bridge.” Select “Run at Startup” and press the small arrow to the right of the text.

How Come Router ‘shutdown’ Takes Several Minutes?

Because you are routing traffic for other peers. If you shutdown your router immediately, you interrupt their traffic.

2
 
 

People's websites get pummeled by LLM companies scraping the web. I bet they don't use nor scrape I2P though. Would using eepsites be a remedy?

3
 
 

/etc/i2pd/i2pd.conf contains number of listening ports configuration (actually 10 or more when you look for "port"). Which ones should I open in firewall so other people can connect my node? Excluding ones that are meant for management of my node. I manage the node only locally.

So far I have only open/forwarded one port, one that is set a few lines below the line "## Port to listen for connections" that certainly allows relaying traffic for other I2P peers per the http://127.0.0.1:7070/ traffic stats.

Services HTTP Proxy	Enabled
SOCKS Proxy	Enabled
BOB	Disabled
SAM	Enabled
I2CP	Enabled
I2PControl	Disabled
4
 
 

From that other site...

‐-----------

Hi everyone,

I’ve been working on a project called OTRv4+ – an OTRv4 client that adds post‑quantum cryptography to every layer of the protocol. It’s a single‑file Python app (with three small C extensions) that runs on IRC, supports I2P/Tor, and even runs on a phone via Termux.

Why post‑quantum?

If a quantum computer breaks X448 tomorrow, your past and future messages are still protected. The key exchange uses Triple X448 + ML‑KEM‑1024, authentication uses Ed448 ring signatures + ML‑DSA‑87, and the ratchet brace key rotates via fresh ML‑KEM‑1024 at every DH epoch. All symmetric crypto uses SHA‑3 / AES‑256‑GCM, which are quantum‑resistant at the symmetric level.

What makes it different?

· No liboqs – I used OpenSSL 3.5+ native FIPS 203/204 providers for ML‑KEM and ML‑DSA.

· Single‑file Python (~12k lines) – the whole protocol is in one file to make auditing easier.

· 224 tests – covering ratchet torture, state forks, wire format fuzzing, and everything in between.

· Runs on Termux – I tested it on my phone with I2P on Libera.Chat.

Comparison with Signal PQXDH

Signal’s PQXDH adds ML‑KEM to the handshake but explicitly says “Authentication in PQXDH is not quantum‑secure”. OTRv4+ uses ML‑DSA‑87 to make authentication post‑quantum as well – at the cost of losing PQ deniability (a known open problem). I think it’s a worthwhile trade‑off for IRC where deniability is less critical.

If you want to try it:

· Git clone: https://github.com/muc111/OTRv4Plus

· Requires Python 3.9+, OpenSSL 3.5+, and a C compiler.

· Works on Termux, Linux, probably other Unix‑likes.

· Supports I2P, Tor, and clearnet with auto‑detection from the hostname.

Feedback / Contributions

I’d love to get your thoughts – issues, pull requests, or just a “hey, this works on my setup”. If you’re interested in a commercial license for proprietary use, please open an issue with the label commercial-license.

Cheers!

5
 
 

From that other site.

‐-------------------------------

Hey guys, I've been building open-source launcher for i2pd that makes getting started with I2P as simple as possible.

What it does:

  • Bundles a forked i2pd build with a preconfigured browser

  • One-click start — no manual configuration needed

  • Native .gn TLD support (custom domain resolution built into the i2pd fork. .gn and .i2p sites working in i2p network)

  • Auto-downloads browser

Current state:

First public beta (v0.1.0 "Ronin"), Windows only for now. It works but expect rough edges — bug reports are very welcome.

GitHub: https://github.com/vialolis/GrayNet

Linux and Android ports are planned. Feedback appreciated.

6
1
submitted 2 weeks ago* (last edited 2 weeks ago) by sp3ctre@feddit.org to c/i2p@lemmy.world
 
 

Hey folks!

I just learned about I2P and already tested it successfully with I2Pd on my debian PC.

But I want to support the network 24/7 so I need to set it up on my raspberry pi 4 and I plan to use it from LAN.

So I installed it like described in the documentation for debian (https://docs.i2pd.website/en/latest/user-guide/install/#linux).

I changed my config via sudo nano /etc/i2pd/i2pd.conf and edited some things like this:

[http]
enabled = true
address = 0.0.0.0
port = 7070

[httpproxy]
enabled = true
address = 0.0.0.0
port = 4444

and I restarted with sudo systemctl restart i2pd

I am using the I2Pd-Firefox-Bundle and I changed the Firefox-settings (Settings -> Network Settings) to this:

(pointing to my raspberry pi)

.i2p-Sites are working well so far, but I am not able to open the webconsole with this configuration. I try to open it with http://192.168.178.26:7070/ but I only get host mismatch.

What am I doing wrong?

Thanks in advance!

~sp3ctre

Edit:

A solution has been found with nginx:

On the Pi:

sudo apt update
sudo apt install nginx

Followed by:

sudo nano /etc/nginx/sites-available/i2pd

Edit to:

server {
    listen 8080;
    server_name _;

    location / {
        proxy_pass http://127.0.0.1:7070/;
        proxy_set_header Host localhost;
    }
}

Enable the file:

sudo ln -s /etc/nginx/sites-available/i2pd /etc/nginx/sites-enabled/

Deleted the nginx-default-site

sudo rm /etc/nginx/sites-enabled/default
7
 
 

In this video I show you how to use Linux in an "ungovernable" way by fetching packages and distro iso's over the I2P darknet.

8
 
 

It's been going on for awhile now. Most of the times sites won't load. Reseting i2p doesn't solve the issue.

9
 
 

Domain Transition

After several years, the I2P project has re-acquired the i2p.net domain and has begun transitioning from geti2p.net to i2p.net.

A custom redirector script ensures that geti2p.net links automatically resolve to their equivalent pages on i2p.net.

Built for Reliability and Speed

The new site runs on Hugo as a fully static build. Every page is pre-rendered HTML no databases, no runtime rendering, and no unnecessary overhead.

Pages load instantly and can be mirrored anywhere with ease.

That matters for a project like I2P. Static architecture makes redundancy simple. Mirrors can be deployed quickly, and the site remains resilient across clearnet, I2P, and Tor.

JavaScript-Free by Default

With the exception of the donate page (which requires a third-party payment widget), the site runs without JavaScript.

  • Dark/light mode is handled server-side
  • Navigation is pure CSS
  • Documentation feedback and banner controls function without client-side scripts

If something could be implemented without JavaScript, we chose that route.

Documentation and Search Improvements

We’ve expanded and reorganized the documentation with full search across specs, guides, and overview content.

Documentation pages now include a lightweight feedback system so users can vote on whether a page was helpful.

Community-Driven Features

We’ve added a feature request system where users can submit ideas and vote on priorities. Development direction should reflect the needs of the people using the network.

There is also a lightweight polling system for gathering community input. It works across clearnet, I2P, and Tor with appropriate endpoints for each.

Expanded Guides and Localization

A new guides section launches with platform-specific installation instructions for Windows, macOS, and Linux.

We are actively looking for community-contributed guides to expand it further.

The entire site is available in 13 languages:

English, Spanish, Korean, Chinese, Russian, Czech, German, French, Turkish, Vietnamese, Hindi, Arabic, and Portuguese.

Supporting the Project

I2P is free and open for everyone to use, but operating the project involves real-world expenses infrastructure, hosting, development, and ongoing maintenance.

We are now accepting donations. Support is available through cryptocurrency as well as credit, debit, and bank transactions.

All donations are tax-deductible in the United States.

If you rely on I2P and want to help ensure its continued development and availability, financial support makes a direct impact.

Downloads Overhaul

The downloads page has been rebuilt to reduce confusion and improve verification:

  • Automatic OS detection highlights the recommended installer
  • Direct, mirror, I2P-native, and Tor download options
  • GPG signatures and SHA256 checksums provided inline
  • Clear “Coming Soon” indicators when releases lag

What’s Next

This rebuild is only the foundation. The next step is expanding practical, real-world documentation especially step-by-step guides for different environments, use cases, and troubleshooting scenarios.

We’ve launched a dedicated guides section with installation coverage for Windows, macOS, and Linux. But we know the community has knowledge that goes far beyond basic setup.

If you’ve written a guide, solved a niche issue, deployed I2P in an interesting environment, or documented a workflow others could benefit from, we’d like to include it.

Community-driven guides will make this site significantly more useful than anything we can produce alone.

If you’re interested in contributing a guide, let us know.

Feedback, bug reports, and contributions are welcome.

10
 
 

Support your anonymous network.

11
12
13
 
 

[2.59.0] - 2026-02-09

Added

  • Post-quantum NTCP2 crypto(ML-KEM-512, ML-KEM-768, ML-KEM-1024) support if openssl >= 3.5.0
  • UDP associate for SOCKS5 proxy
  • Trusted routers list for first hop per tunnel
  • "i2p.streaming.maxConnsPerMinute" and "i2p.streaming.maxResends" params
  • Limited connectivity mode
  • *.b32.i2p addresses for SAM datagrams
  • Limiting the number of datagrams sent to maintain the consistency of session encryption through UDP tunnels
  • Desktop app mode for Haiku
  • Ability to suppress X-I2P-* headers for HTTP server tunnel
  • Multi cloves garlic message for datagrams
  • Network error and testing metrics for I2PControl
  • Handle reseed address redirection
  • Throttle excessive number of tunnel build message from the same peer
  • Localization to Esperanto, Filipino and Finnish

Changed

  • Return base64 of ident instead full address for Datagram3 in SAM
  • Send ratchet session response for unidirectional traffic for I2CP
  • Set default number of generated tags to 800 for a datagram destination
  • Check ML-KEM encaps_key section length before decryption
  • Create new stream only if bandwidth is available. Close non-responding streams
  • Use Datagram3 by default in UDP tunnels
  • Floodfills are not introducers
  • Disable ipv6 if global ipv6 interface not found
  • Network congestion detection algorithm in streaming
  • Reply with relay tag only if accept tunnels
  • Case-insensitive Content-Length header in I2PControl
  • Increase PID string length
  • Don't communicate with routers of version < 0.9.58
  • Webconsole layout improvements
  • Localization to Hebrew
  • Reseeds list

Fixed

  • Incorrect params length calculation for SAM streams
  • Unexpected index in SymmetricKeyTagSet
  • Incorrect preferred crypto type if i2cp.leaseSetEncType is not specified
  • Decoding %00 in url
  • Thread-unsafe localtime()
  • NetDb crash on stop
  • Peer test result OK in case of another recent peer test
  • Published port if full-cone NAT
  • Missing trailing newline in I2PControl JSON response
  • Language selection in webconsole
14
 
 

The I2P network is currently experiencing an attack by unknown actor(s). Tens of thousands of malicious routers have been introduced to the network that are not actually routing any traffic. This is causing:

  • Extremely low tunnel build success rates
  • Overall network congestion
  • Degraded performance for legitimate users

The I2P development team is aware of this situation and actively investigating mitigations.

We will post updates to this thread as the situation develops. Thank you for your patience.

Update: 2/4/2026 11AM CST - Fixes are being tested now.

Update: 2/4/2026 7pm EST - Some changes were implemented in a new build to help combat the issue. Right now I only have the binaries for apple silicon.

IRC is semi alive, if you update your IRC config to use irc.echelon.i2p:6667 you should be able to connect.

https://files.i2p.net/I2P-2.10.0-5.dmg

2.10.0-5 i2pupdate.zip

https://files.i2p.net/i2pupdate-2.10.0-5.zip

15
1
submitted 2 months ago* (last edited 2 months ago) by CAVOK@lemmy.world to c/i2p@lemmy.world
 
 

As of 2025 the P2P System Tixati has full I2P support.

How to configure it for use with I2P: https://support.tixati.com/i2p

Full changelog here: https://tixati.com/news

Sadly not OSS, so "Caveat Emptor".

Edit: Forgot that it's 2026 now.

16
 
 

I just installed and started i2pd following the Arch Wiki at https://wiki.archlinux.org/title/I2P

I opened up the welcome page at 127.0.0.1:7070, which looks like this:

Are there any settings at the welcome page or tweaks that I can apply to the config file to optimize my router? All I want to do is to contribute bandwidth at the moment, not necessarily use the network myself. I have a 1 Gbps connection that never gets saturated.

I saw for instance a setting called "Transit tunnels limit". Is it beneficial for peers if I increase this?

Thanks in advance!

17
 
 

cross-posted from: https://sh.itjust.works/post/52298822

The nginx server block is listening on a port other than 80, if that matters. It's all my VPN provider will allow me to forward.

18
 
 

Has there been a major blackout of the internet worldwide or even in part ?? It's showing cloudflare error 500 on my device.

19
 
 

I am trying to make sure I am ready for 2.11 since it will require Java 17. But I tried getting Java 24 JDK SE and removed Java 8 JRE and then I2P router launcher said I didn't have Java. I tried looking for JRE above 8 but I just keep seeing 24 JDK. The I2P site links to tanuki for a wrapper of the Community Edition but they say there isn't a x64 version of Community Edition.

Does anyone have links for a Windows x64 JRE that is 17 or higher? I have reinstalled Java 8 JRE for now since it fixed the issue of running the I2P router launcher. I have only ever needed the 8 or lower JREs so I am a real noob at Java stuff.

20
21
22
 
 

Work continues on the implementation and deployment of post-quantum cryptography in I2P. In this release post-quantum cryptography is available but not turned on by default for new tunnels. Those of you interested in testing post-quantum support should enable it via the "Hidden Service Manager" under "Encryption Types." Be sure to get in touch on #i2p-dev in IRC2P for help and to report any issues you encounter.

I2PSnark now supports UDP trackers. This should help the network overall by reducing the load of torrent trackers.

Stability improvements have been made to the Hidden Mode which will reduce the chance of running out of RouterInfos.

Important! In the next release, I2P will require Java 17 or later.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

23
 
 

A guide (not mine) on how to setup IRC over I2P, perhaps to have a little chat with the developers?

24
 
 

From that other site.

Hi I2P community,

I’m a distro developer and I recently built a Linux distribution specifically for I2P. Along with it, I’ve also developed a hardened, customized Firefox for I2P.

You might have heard of me from Securonis Linux. Securonis also supports I2P, but since it’s primarily Tor-focused, browsing I2P sites there wasn’t always smooth.

You can find more details and download the ISO here: https://dimensionalriftos.github.io/

The ISO can run as a live system and is installable via Calamares. Some security settings are enabled right after installation. The distro is completely open-source, and its code is available on GitHub. If you encounter any issues, want to report bugs, or contribute, feel free to reach me.

25
 
 

Copied from that other site...

Good Evening, I hope i am doing this right i stumbled upon https://www.reddit.com/r/i2p/comments/zxmh0f/best_places_to_actually_advertise_i2p_sites/ when looking for more information on sharing the url but i have made an official i2p hidden service for neondystopia.world so that people can access the service anonymously, it used a 3 hop.

Put the router on max bandwith with 90% share to help out because i love this network :)

https://preview.redd.it/964p960gstkf1.png?width=1105&format=png&auto=webp&s=d8f9a4cac0d5ba0eec414a9a67ec3755621b74fe

Helper: http://neondystopia.i2p/?i2paddresshelper=kgfnepmwoarbvgkqrrwkq2jjca4d52herifqkwaxsdsgezvye5na.b32.i2p

view more: next ›