• The I2P network is an Overlay Network. The Invisible Internet Project began in 2002 and has been active since that time. How Does I2P Protect Me?
  • All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet.
  • The following guide addresses everything you need to know about I2P and explains how to start using the network. 1 What is I2P?
  • I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.
  • In this extensive guide we look at what the Invisible Internet Project (I2P) is, how it works, and how to use it.
  • It is now possible to install all I2P components using a single package (No Java required). To try out the new installer, click below.
  • I2P (known as the Invisible Internet Project - founded in 2003) is a low-latency network layer that runs on a distributed network of computers across the globe.
  • You're just 10 minutes away from setting up a high performance I2P Network router. We’re happy to proudly support and promote the I2P Network.
  • I2P over Tor. Tunneling the I2P Anonymizing Network over the Tor Anonymizing Network. Connection Schema: Tor → I2P → Destination. https://www.whonix.org/wiki/I2p#...
  • There were plans for a 2016 I2P Con but it does not appear to have come to fruition. There are no other I2P-centric conventions as far as I know.