Network Drive Manager brings added value to users that access network drives in a computer network, ranging from small home networks to large corporate networks. Network Drive Manager is ...
I2P 0.9.37Handy tool that enables apps to securely chat
I2P is a handy tool that enables apps to securely chat. The network itself is strictly message based , but there is a library available to allow reliable streaming communication on top of it. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
I2P 0.9.37 details
|Released:||Oct 5, 2018|
|File size:||18.10 MB|
|Keywords:||network message, network communication, tunnel manager, network, message, peer|
Windows 10 Blog
I2P for Windows 10 - Full description
I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
To hide the sent messages, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively).
Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.
The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender's and the receiver's threat model.