Network Drive Manager brings added value to users that access network drives in a computer network, ranging from small home networks to large corporate networks. Network Drive Manager is ...
I2P 0.9.43Handy tool that enables apps to securely chat
I2P is a handy tool that enables apps to securely chat. The network itself is strictly message based , but there is a library available to allow reliable streaming communication on top of it. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
I2P 0.9.43 details
|Released:||Oct 24, 2019|
|File size:||13.40 MB|
|Keywords:||network message, network communication, tunnel manager, network, message, peer|
Windows 10 Blog
- Recent Windows 10 updates may have caused a number of problems. Microsoft has released a cumulative fix
- Turn the Start menu unrecognizable
- The autumn “big” version of Windows should be released this week. What’s new?
- Recovering Windows 10 from the Cloud: How it Really Works
- Windows 10 is on 900 million devices
I2P for Windows 10 - Full description
I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
To hide the sent messages, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively).
Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.
The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender's and the receiver's threat model.