I2P screenshot

I2P 0.9.43

Handy tool that enables apps to securely chat

I2P is a handy tool that enables apps to securely chat. The network itself is strictly message based , but there is a library available to allow reliable streaming communication on top of it. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.

I2P 0.9.43 details

Author:
License: Freeware
Price: FREE
Released:
File size: 13.40 MB
Downloads: 146
Keywords: network message, network communication, tunnel manager, network, message, peer
Author URL: http://www.i2p2.de
I2P

User Rating: 3.5 (4 votes)

Windows 10

x32

Windows 10

x64

I2P Awards

Windows 10 download 5 stars award

I2P for Windows 10 - Full description

I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.

To hide the sent messages, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively).

Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.

The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender's and the receiver's threat model.

I2P for Windows 10 - Post your review