

The packets are bounced all over the globe using I2P. I2P uses bundled encryption over a multi-proxy like Tor. In addition to this, tunnels in I2P are short lived, decreasing the number of samples that an attacker can use to mount an active attack with, unlike circuits in Tor, which are typically long lived.Īrchitecture of I2P (the following section was taken from the technical documentation of I2P, located here): The unidirectional tunneling system used by I2P doubles the amount of nodes that a peer needs to compromise to get the same information that could be obtained from Tor’s bidirectional tunneling system.In contrast, the smaller size of I2P has allowed it thus far to float beneath the radar of government censors and malicious users. Although Tor is more popular and has significantly more funding than the I2P network, in recent times the network has become incredibly saturated and is more vulnerable.This allows I2P to transparently route around congestion and other network failures, operate redundant pathways and load balance the data across available resources. I2P is fundamentally a packet switched network whereas Tor is fundamentally a circuit switched network.Content hosted on networks such as Freenet are mostly static, whereas websites hosted within I2P can be fully dynamic.websites and other services hosted within I2P), and they are much faster than the corresponding ones on the Tor network, as the I2P network is fully distributed and self-organizing. Furthermore, I2P is designed and optimised for “hidden services” (i.e. While Tor was designed with the intention to enable anonymous Internet browsing, I2P’s focus is to provide an anonymous network, isolated inside the Internet, offering various protocols and applications within.Rather than building an essentially trusted, centralised system with directory servers, I2P has a self-organizing network database with each peer taking on the responsibility of profiling other routers to determine how best to exploit available resources. I2P is completely decentralized, unlike Tor where a ‘directory’ of the network is maintained.Below are the technical factors that lead us to our choice: We then proceeded to examine the various strengths and weaknesses of the two networks, before finally settling upon I2P. Having examined the existing anonymous networks and discussing the options in a group meeting, we narrowed down our choices to either the TOR network or the I2P network. We did not actually do this because we do not have an external server to use.Ĭonfigure, hosting, I2P, network, technical
#I2p vs freenet how to#
We also used this video to learn how to host an eepsite by creating a new HTTP server tunnel and to map it to a virtual host rather than use the default Jetty. Since many routers periodically get address book updates from these sites, within several hours others will be able to find your website by simply typing 3speech.i2p into their browser. After adding it, we can check to see if it reports the key was added. Again, your key is the entire “Local destination” key on the eepsite i2ptunnel configuration page. The final step is registering the eepsite in an address book hosted by i2p, which is part of the NetDB (explained in the about I2P post). Click “Add” to add the destination to your address book. Enter the name and paste in the destination key into your master address book. Make sure you get the whole thing – it’s over 500 characters and it must end in “AAAA”. Highlight the entire “Local destination” key on the eepsite i2ptunnel configuration page and copy it for later pasting. This will replace the default “mysite.i2p”. You could just tell people that really long key, but thankfully I2P has an address book and several easy ways to tell people about your eepsite.įirst, enter the new name of the eepsite on the eepsite i2ptunnel configuration page where it says “Website name”.

Of course, the destination of the eepsite is on the local host and it will be difficult for other people to find because it doesn’t have a name and they don’t have your really long Base64 key. There are some redirect to help instructions in the file, once those are deleted things are good to go. On Windows, at this location: C:\Program Files\i2p\eepsite is where you will find the index.html file of the eepsite. Click the start button, and wait for it to start up. Once inside, in the I2P Server Tunnels section, you will see the default eepsite. On the router console homepage, in the left hand bar there is a link to the I2PTunnel under the heading I2P Internals.
#I2p vs freenet install#
The default install of I2P comes with a Jetty web daemom, so starting up the eepsite is actually incredible easy.
