www.i2p2.de Open in urlscan Pro
2a02:180:2:c1:81:7:7:63  Public Scan

Submitted URL: http://www.i2p2.de/
Effective URL: http://www.i2p2.de/en/
Submission: On March 14 via manual from CA — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip navigation


THE INVISIBLE INTERNET PROJECT

 * English
 * Deutsch
 * Castellano
 * Français
 * Russian Русский язык
 * Chinese 中文
 * Arabic العربية
 * Bahasa Indonesia
 * Chinese 中文 (繁體中文, 台灣)
 * Greek Ελληνικά
 * Hebrew עברית
 * Hungarian
 * Italiano
 * Japanese 日本語
 * Korean 한국말
 * Fiteny Malagasy
 * Nederlands
 * Persian فارسی
 * Polski
 * Português
 * Português do Brasil
 * Română
 * Suomi
 * Svenska
 * Türkçe
 * Ukrainian Українська

 * Download
 * About
   * Introduction to I2P
   * Guide to I2P Software
     * What is Included
     * 
     * How to browse I2P
     * FAQ
     * Applications
       * Bittorrent
       * GitLab
       * Git
       * git+Bittorrent
       * IRC
   * Help
     * Glossary
     * Performance
     * Comparisons
       * Tor
       * Freenet
       * Other anonymous networks
     * Verify I2P
       * Release signing keys
       * Signed keys
       * Developers keys
     * Contact us
   * Contributor Guides
     * Get involved!
     * 
     * Develop Software
       * New developers
       * Using an IDE with I2P
       * Developer guidelines and coding style
       * Git
     * Translate I2P into more Languages
     * Hosting Services
       * Reseed
       * GitLab
   * Contact and Team
 * Community
   * Forums
   * Reddit
   * Research
     * Research
       * Academic research
       * Open research questions
       * Vulnerability Response Process
     * Academic papers and peer review
     * Presentations, tutorials and articles
       * Media
       * I2PCon
     * Impressum
     * I2P Metrics
   * Develop
     * Gitlab
     * Docs
       * Documentation index
       * How does it work?
         * Gentle intro
         * Tech intro
         * Threat model
         * Garlic routing
         * Network database
         * Tunnel routing
         * Peer selection
         * Cryptography
         * ElGamal/AES+SessionTags
       * Specifications
       * Proposals
       * API
         * I2PTunnel
         * SOCKS
         * SAM v3
         * BOB
         * Streaming library
         * Datagrams
         * I2PControl
       * Protocols
         * Protocol stack
         * I2CP
         * I2NP
       * Transports
         * Transport layer overview
         * NTCP
         * SSU
       * Tunnels
         * Tunnel implementation
         * Unidirectional tunnels
         * Old implementation
       * Naming and Address Book
       * Plugins
       * Strict Countries
     * API
       * I2PTunnel
       * SOCKS
       * SAM v3
       * BOB
       * Streaming library
       * Datagrams
       * I2PControl
     * License
       * Applications
       * Licenses
     * Meetings, Roadmap
       * Meeting Logs
       * Project Roadmap
       * Task list
     * Bug tracker
   * People
     * Contact us
 * Blog
 * Language
   * English
   * Deutsch
   * Castellano
   * Français
   * Russian Русский язык
   * Chinese 中文
   * Arabic العربية
   * Bahasa Indonesia
   * Chinese 中文 (繁體中文, 台灣)
   * Greek Ελληνικά
   * Hebrew עברית
   * Hungarian
   * Italiano
   * Japanese 日本語
   * Korean 한국말
   * Fiteny Malagasy
   * Nederlands
   * Persian فارسی
   * Polski
   * Português
   * Português do Brasil
   * Română
   * Suomi
   * Svenska
   * Türkçe
   * Ukrainian Українська


WELCOME TO THE INVISIBLE INTERNET

The Invisible Internet is a privacy by design, people-powered network. It is a
truly free and anonymizing Internet alternative. Get I2P.

Get I2P 1.7.0


WHAT IS I2P?

 * The Invisible Internet Project (I2P) is a fully encrypted private network
   layer. It protects your activity and location. Every day people use the
   network to connect with people without worry of being tracked or their data
   being collected. In some cases people rely on the network when they need to
   be discrete or are doing sensitive work.


I2P CARES ABOUT PRIVACY

 * I2P hides the server from the user and the user from the server. All I2P
   traffic is internal to the I2P network. Traffic inside I2P does not interact
   with the Internet directly. It is a layer on top of the Internet. It uses
   encrypted unidirectional tunnels between you and your peers. No one can see
   where traffic is coming from, where it is going, or what the contents are.
   Additionally I2P offers resistance to pattern recognition and blocking by
   censors. Because the network relies on peers to route traffic, location
   blocking is also reduced.
 * Read more…


PEER-TO-PEER

The network is people powered . Peers make a portion of their resources,
particularly bandwidth, available to other network participants. This allows the
network to function without relying on centralized servers. Learn more about the
Protocol Stack.


PRIVACY AND SECURITY BY DESIGN

I2P has created transport protocols that resist DPI censorship, and continuously
improves its end to end encryption. Read the I2P Transport Overview.


BUILT FOR COMMUNICATION

I2P has an application layer with easy to use APIs for creating your own privacy
- aware apps.

I2P Blog ATOM Feed


NEWS & UPDATES

 * 2022-02-21 - 1.7.0 Release
 * 2021-12-29 - Year in Review: 2021
 * 2021-12-11 - I2P is not affected by the log4j vulnerability
 * 2021-11-29 - 1.6.1 Release
 * 2021-11-02 - I2P Jpackages get their First Update
 * 2021-09-18 - Bitcoin Core adds support for I2P!
 * 2021-09-15 - Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero
 * 2021-09-07 - Level up your I2P Skills with Encrypted LeaseSets
 * More blog posts…

Hero Image courtesy of Pixabay artist Montevideo

 * Mastodon
 * Reddit
 * Twitter

 * Official Forums
 * Contact
 * Impressum
   
   

 * Gitlab
 * Get involved!
 * FAQ