Fact-checked by Grok 2 weeks ago

I2P

I2P, the Invisible Internet Project, is an open-source layer that facilitates fully encrypted communication, concealing message contents, sources, and destinations from observers through garlic routing and tunnel-based . Launched in as an evolution from earlier efforts like the Invisible IRC Project, I2P was developed to enable resilient, censorship-resistant applications such as web hosting via eepsites, decentralized email with I2P-Bote, and , all confined within its internal to minimize exposure to external . Unlike networks focused on clearnet access, I2P prioritizes inbound and outbound for hosted services, employing a distributed network database and self-organizing peer selection to maintain scalability and fault tolerance without central authorities. Its design supports diverse protocols including IRC, , and HTTP over encrypted unidirectional tunnels, fostering a -centric that has endured for over two decades amid ongoing performance optimizations and refinements. While enabling legitimate privacy tools, I2P's strong has drawn forensic scrutiny for harboring illicit activities, highlighting challenges in attribution and the inherent trade-offs of decentralized systems.

History

Origins and Early Development

The Invisible Internet Project (I2P) traces its origins to the Invisible IRC Project (IIP), conceived in October 2001 by developer Lance James (pseudonym 0x90) in response to escalating online surveillance concerns following the . IIP sought to enable real-time anonymous messaging integrated with , a censorship-resistant , by leveraging early concepts for decentralized communication. The project's initial code was outlined informally on a , with a prototype presented at CodeCon in in 2002, emphasizing secure, internal over reliance on external infrastructure. In early 2003, pseudonymous developer jrandom joined IIP and expanded its scope beyond IRC-specific tools to develop a general-purpose network layer, leading to the rebranding as I2P by late summer 2003. This shift incorporated a foundational of privacy-by-design, prioritizing resistance to centralized authorities and censorship through a self-contained system focused on internal services such as messaging and , distinct from clearnet outproxying. Initial prototypes positioned I2P as a scalable overlay for publish-subscribe applications, aiming to shield users from surveillance by confining traffic within the network and blending individual activities with aggregate user data. By the mid-2000s, I2P had fully embraced open-source principles, with jrandom leading active development supported by part-time global contributors and community forums for coordination. The project adopted as its version control system, selected for its cryptographic integrity and compatibility with I2P's own network for secure code distribution. Key early milestones included the release of version 0.6 on November 1, 2003, which solidified prototypes using precursors tailored for , fostering gradual network growth amid a commitment to empirical resilience against and institutional controls.

Key Milestones and Releases

In 2013, Anoncoin integrated native support for I2P, marking an early enhancement for privacy-focused transactions routed anonymously through the network. The 0.9.24 release on January 27, 2016, required 7 and transitioned to Ed25519 signatures, strengthening while introducing version 3.2 for application integration. Later that year, version 0.9.27 on October 17 added initial work on NTCP2 transport and SSU peer testing, laying groundwork for protocol modernization. A pivotal infrastructural shift occurred with the 0.9.36 release on August 23, 2018, introducing the NTCP2 protocol (initially disabled), which improved and efficiency over the legacy NTCP1. This was enabled by default in 0.9.37 on October 4, 2018, alongside Android i2ptunnel SSL fixes that advanced mobile compatibility. NTCP1 was fully disabled in 0.9.40 on May 7, 2019, enforcing the protocol upgrade and including further Android stability improvements. Version 0.9.38 on January 22, 2019, added a setup wizard, beta Mac OS X installer, and preliminary for faster encryption. By 0.9.46 on May 25, 2020, ECIES implementation was completed with streaming performance gains and additional fixes. The 0.9.47 release on August 24, 2020, enabled ECIES by default, mandated 8, and activated default blocking to bolster network resilience. On December 10, 2020, I2P migrated from to for , decentralizing code management and easing collaborative development across distributed contributors. These updates, particularly NTCP2 and ECIES transitions, represented hard protocol cut-overs requiring network-wide router upgrades to maintain and .

Recent Developments (Post-2020)

In August 2021, the I2P project commemorated its 20th anniversary through detailed historical retrospectives, emphasizing its progression from initial C-language prototypes focused on anonymous IRC access to a mature, Java-implemented with hundreds of contributors and decentralized source code management via , which improved collaboration over prior systems like that proved inadequate for I2P's distributed environment. By October 2022, I2P integrated the SSU2 transport protocol, a UDP-based upgrade to the original SSU that incorporates contemporary cryptographic standards for enhanced encryption layers, blocking resistance, and overall security against , marking a key infrastructural evolution deployed in subsequent router releases. In September 2025, the project released version 2.10.0, incorporating these protocols alongside performance optimizations, while October announcements highlighted multiple new router prototypes from community developers, signaling expanded implementation diversity and network participation amid steady growth to approximately 12,000 active nodes by mid-2025, a 20% rise from 2022 levels. Empirical assessments in 2025 underscored I2P's operational robustness; a Wiley-published computational modeled the overlay across , scale-free, and I2P-specific topologies, quantifying resilience to random node failures and targeted attacks via metrics like size and , revealing strong recovery under disruptions but vulnerabilities to centrality-based assaults that necessitate design refinements. Complementing this, a framework and dataset from October 2025 enabled spatial mapping of I2P's through active probing of thousands of routers, yielding representations of , destinations, and distributions that facilitate verifiable analysis of and threat vectors beyond application-layer eepsites. Android-specific integrations advanced with router updates aligning to the 2025 , including SSU2 compatibility and refined console interfaces for mobile tunneling, as documented in and distributions, ensuring compatibility with devices from 4.0 onward while prioritizing standards without compromising anonymity guarantees.

Technical Design

Network Architecture

I2P functions as a layered atop the , designed primarily for anonymous communication within its own ecosystem rather than extensive clearnet egress. It employs a packet-switched where is fragmented into encrypted packets routed through temporary, unidirectional tunnels formed by sequences of routers, typically 2 to 3 in length. These tunnels separate inbound and outbound traffic flows, reducing exposure of communication patterns by limiting visibility to one direction per path and thereby halving the observable traffic compared to bidirectional circuits. The network's self-organizing topology emerges from routers dynamically selecting peers based on capabilities, , and reliability, without reliance on centralized directories. Central to routing is garlic routing, an extension of that bundles multiple messages—or "cloves"—into larger "garlic" payloads before layered encryption and transmission, enhancing efficiency by amortizing overhead across packets and complicating through non-uniform payload sizes and delivery instructions. Unlike strict 's fixed per-message peeling, garlic allows cloves to share segments where paths overlap, supporting variable and opportunistic mixing without requiring synchronized circuits. This design prioritizes endpoint by concealing sender-receiver associations through endpoints that act as proxies, with messages fragmented and reassembled only at the final hop. The network database (netDB) underpins peer discovery and topology maintenance as a (DHT) adapted from , storing two object types: RouterInfos detailing individual router identities, capabilities, and contact data, and LeaseSets for destinations including tunnel endpoints and cryptographic keys. Routers flood updates to a subset of well-connected "floodfill" peers for propagation, ensuring logarithmic search times while distributing load to avoid single points of failure. Empirical measurements indicate netDB queries resolve within seconds under typical loads, supporting resilient lookup amid churn rates where 10-20% of routers may join or leave hourly. For operational efficiency, routers maintain pooled sets of pre-built tunnels categorized by purpose—exploratory for netDB interactions, client for application traffic—allowing rapid packet dispatch without per-message , which could otherwise impose latencies exceeding 1-2 seconds. Pools typically hold 5-50 tunnels per type, replenished every 10 minutes to balance freshness against build costs, with shorter tunnels favored for low-latency needs and longer for added mixing. Limited bridging to the clearnet occurs via volunteer-operated outproxies for outbound traffic and inproxies for inbound, though this is de-emphasized in the core design to minimize external observability and abuse risks, with outproxy throughput capped to prevent network degradation.

Routing Mechanisms

I2P implements routing as its core mechanism for traffic obfuscation, extending principles by bundling multiple "cloves"—individual messages or delivery instructions—into a single "garlic" message. This bundling permits mixing of unrelated payloads, such as application data alongside delivery status confirmations or database updates, thereby resisting by concealing correlations between messages. Garlic messages traverse unidirectional tunnels via layered ElGamal/ encryption, with each hop decrypting only its designated layer to forward the payload without revealing endpoints. Tunnels form the backbone of routing, constructed as temporary, fixed-length paths selected dynamically by the creator based on peer profiles including bandwidth, uptime, and integration metrics. Exploratory tunnels, defaulting to 2 hops, handle router-internal tasks like network database lookups and replies, while participating tunnels, typically 2-3 hops, route client application traffic; longer configurations up to 7 hops are possible but increase latency. Tunnels expire after approximately 10 minutes and are rebuilt periodically, with path selection prioritizing diversity to distribute load and thwart targeted attacks. Padding aligns garlic message payloads to multiples of 16 bytes, aiding volume anonymity by masking message sizes and frequencies. The I2NP protocol governs message exchange within this framework, distinguishing control-plane functions—such as TunnelBuildMessage for path negotiation and DatabaseLookupMessage for peer discovery—from data-plane operations via for encrypted payloads. These messages integrate seamlessly with , enabling end-to-end where origins and destinations remain concealed through successive decryption and forwarding, ensuring causal separation from observer vantage points. In early implementations, tunnel transitions involved abrupt rebuilds without overlap, potentially exposing brief discontinuities, though modern versions incorporate testing via DeliveryStatusMessage to validate paths preemptively.

Cryptographic Protocols

I2P utilizes a hybrid cryptographic approach combining asymmetric for with symmetric AES-256 for data payload protection, forming the basis of its and security. Each participating router and destination maintains long-term public-private key pairs, typically ElGamal for encryption and or ECDSA for signing, enabling non-interactive establishment without direct peer coordination. Ephemeral session keys are generated per communication session; for initial messages, ElGamal encrypts the AES-256 key material, after which session tags—opaque 32-byte identifiers derived from the key—facilitate rapid subsequent encryptions without re-keying, reducing computational overhead while maintaining properties. In garlic routing, messages are bundled into "cloves" wrapped in multiple ElGamal/ layers, with each layer using a 256-bit key in mode and #5 padding to obscure message lengths and contents. This padding, sender-specified and randomized, provides verifiable resistance to known-plaintext attacks by ensuring variable data expansion, complicating cryptanalytic efforts reliant on predictable structures. Tunnel creation employs a telescoping method where build requests are encrypted hop-by-hop using precomputed ElGamal encryptions, with AES-derived IV and reply keys securing inbound and outbound paths against replay and tampering. Authentication integrates digital signatures on router identities and lease sets, using DSA-2048 by default but extensible to for efficiency, ensuring message integrity and without relying on centralized certificates. While I2P's core protocols remain grounded in classical , recent specifications explore ECIES variants with X25519 for potential efficiency gains, though full post-quantum transitions have not been implemented as of 2025, reflecting empirical priorities in over speculative threats.

Implementation and Releases

The of I2P is written in and maintained as open-source code on , with stable releases published through the official project website. Releases adhere to a consistent cycle of approximately 13 weeks, targeting four updates annually to address vulnerabilities, enhance , and introduce incremental improvements without disrupting functionality. This structured versioning ensures compatibility across the network while allowing for timely patches, as demonstrated by rapid community-wide upgrades following identified issues such as the CVE-2020-13431 vulnerability. Automated software updates are facilitated via a secure protocol using SU3-signed file bundles, enabling individual routers to verify and download updates independently from trusted repositories. This decentralized approach avoids reliance on central authorities, with routers configured by default to check for updates periodically and prompt users for approval, thereby balancing security needs with user control. As of September 8, 2025, the latest stable release is version 2.10.0, which includes optimizations and prepares for stricter Java 17+ requirements in future iterations. Bootstrap integration for new deployments relies on reseed mechanisms, where routers contact a predefined list of public reseed hosts—typically via clearnet—to retrieve an initial set of approximately 100 router bundles for peer . These hosts, operated by community volunteers, provide cryptographically signed data to prevent tampering, ensuring reliable entry into while minimizing exposure during the initial phase. Alternative methods, such as file-based reseed bundles shared offline, further decentralize this process for environments with restricted connectivity. Once integrated, routers propagate their presence through the distributed database, contributing to without version-specific gating.

Features and Applications

Core Router and Networking

The I2P core router operates as a daemon process that implements the foundational networking layer for anonymous communication within the I2P . It manages the creation and maintenance of encrypted tunnels, handles message bundling via garlic routing, and facilitates connectivity through a distributed database known as netDB. The router enforces user-configurable limits to balance local usage with network participation, typically allocating shares above 128 KB/s for efficient relay of traffic. Garlic routing, executed by the core router, bundles multiple messages—or "cloves"—into encrypted "bulbs" for layered obfuscation and delivery confirmation, differing from by allowing partial decryption and rerouting at intermediate hops. Tunnels are unidirectional, with outbound tunnels originating from the local router and inbound tunnels terminating there, generally spanning 2 to 3 hops to balance and . Tunnel construction involves garlic-routed build messages distributed to potential participants, ensuring no single router knows the full path. Peer relies on netDB queries, where the router sends lookup requests to floodfill peers—high-capacity nodes that and disseminate routerInfo entries containing keys, capabilities, and addresses. Exploratory , distinct from client tunnels, are used for these netDB operations and tunnel management, minimizing exposure for sensitive traffic. settings influence netDB flooding participation, with higher shares enabling routers to more entries and respond to queries effectively. The router's integrates standard and layers with I2P-specific components for and handling, supporting both and over I2P for versatile connectivity establishment. Configuration files allow specification of ports—often randomized between 9000 and 31000 for inbound traffic—and UPnP for automatic forwarding, enabling empirical setups where reachable nodes integrate within minutes upon reseeding from trusted sources.

Communication and Publishing Tools

I2P provides several integrated tools for anonymous communication and content publishing, leveraging its garlic routing and to enable pseudonymous interactions without reliance on external clearnet . These tools prioritize internal operations, reducing exposure to and by design, as traffic remains confined within the I2P overlay. Susimail, a web-based bundled with the I2P router since its early development in the mid-2000s, facilitates pseudonymous exchange over I2P tunnels, connecting to services like Postman's hosted provider at mail.i2p. Developed by a contributor known as "Susi," it supports basic SMTP/IMAP-like functionality adapted for , with features such as management and no default storage of sender identities on servers. I2P-Bote, a introduced around 2012, extends this with fully decentralized, serverless using a (DHT) for message storage and retrieval, where emails are end-to-end encrypted and fragmented across participating nodes without central servers. This design ensures resilience against single-point failures or targeted shutdowns, as messages persist in the DHT until retrieved by recipients via their private keys. For real-time messaging, Irc2P enables anonymous IRC participation through client tunnels that connections to internal servers, enforcing a of commands to prevent deanonymization risks like reveals via queries or excessive data transfers. Users configure standard IRC clients to route via I2P's proxy at 127.0.0.1:4447, maintaining pseudonymity as inbound/outbound traffic is tunneled and obfuscated. Publishing tools center on Syndie, a cross-network blogging and forum platform integrated with I2P since at least 2007, allowing authors to post content pseudonymously to eepsites or syndicate across anonymity networks like . Syndie supports threaded discussions, stripping for privacy, and high-latency posting to evade timing attacks, with I2P-specific releases like version 1.105b in 2014 enhancing router compatibility. Eepsites, I2P's hidden services for hosting static or dynamic websites ending in .i2p, enable censorship-resistant publishing by distributing via destination keys rather than DNS, with empirical showing the network's resistance to address-based ing—requiring a to block over 90% of entry points to degrade significantly. This internal hosting model causally outperforms clearnet alternatives for evading shutdowns, as operators control private keys without third-party dependencies.

File Sharing and Media Services

I2PSnark serves as the primary client integrated into the I2P router, enabling exclusively over the I2P network to maintain without direct clearnet peer connections. It leverages I2P's garlic routing and unidirectional s to connect with peers, obfuscating participant identities and resisting through layered and endpoint . Users can create, seed, and download .torrent files hosted on I2P eepsites or distributed via internal trackers, with the client automatically managing pools for inbound and outbound traffic to balance load and resilience. While I2PSnark prioritizes internal I2P torrents for optimal privacy, configurations allow bridging to clearnet trackers or peers via I2P outproxies, though this introduces potential deanonymization risks if not isolated properly, as outproxy traffic may leak . Empirical indicates I2PSnark usage constitutes a significant portion of I2P traffic, with popular swarms achieving download speeds up to 2 MB/s under favorable conditions, though average throughput is constrained by limits of approximately KB/s per and overall destination around 300 KB/s. These figures reflect the network's smaller scale compared to clearnet , where fewer active peers for niche content can result in slower and higher failure rates for less popular files. For media services, I2P's streaming builds on the core I2CP to support reliable, ordered bidirectional streams suitable for audio or video playback over tunnels, enabling applications like media servers or clients without exposing endpoints. This facilitates low- distribution in controlled environments, such as eepsite-hosted streams, but real-world performance mirrors constraints, with and varying by peer density—often inferior to for external accesses due to I2P's focus on internal services and smaller user base of around 40,000-60,000 daily active nodes. In comparisons, I2P's design yields faster hidden service interactions than Tor's services for sustained P2P sessions, yet the limited empirically hampers for high-demand media, prioritizing over raw speed.

Platform-Specific Integrations

I2P supports mobile integration primarily through router applications, enabling users to run a full I2P on devices with Android 4.0 or higher. The official I2P app, available via and , bundles the router and allows access to I2P services like eepsites and tunnels, with originating from the i2p.android.base repository maintained since the early . These apps facilitate embedding I2P into other applications or configuring browsers such as Privacy Browser for I2P access, including disabling and enabling incognito mode to minimize leaks, as outlined in community guides. Unlike core I2P design focused on desktop overlay networking, these extensions prioritize lightweight tunneling and proxying for resource-constrained mobile environments, with ongoing updates addressing issues for stability. In cryptocurrency ecosystems, I2P integrates with nodes like to enhance connectivity and transaction routing . users can configure daemons to operate over I2P using tools such as i2p-zero, allowing inbound connections via I2P addresses while broadcasting transactions through the anonymizing layer, though synchronization remains reliant on clearnet or setups due to limitations. Official documentation supports I2P for wallet-to-node links, providing stronger obfuscation compared to clearnet peers, with empirical tests showing reduced exposure in . This differs from I2P's foundational garlic routing by layering it atop privacy-focused s, yielding verifiable improvements in endpoint hiding without altering core like 's ring signatures. Other platform adaptations, such as IRC clients like Revolution IRC for , extend I2P's interoperability by proxying connections to Irc2P servers on ports, supporting multi-account setups without native I2P modifications. These integrations emphasize practical extensions for ecosystem-specific use cases, maintaining I2P's internal traffic while adapting to platform constraints like battery life and access.

Community and Governance

Development and Funding Model

The Invisible Internet Project (I2P) has been developed by a decentralized of volunteers since its in 2002, with no formal or paid staff directing core efforts. Development coordination occurs through open platforms including for code repositories, for announcements, and Reddit's r/i2p subreddit for discussions, fostering self-reliant governance free from centralized authority or external mandates. This model prioritizes contributor autonomy, with decisions emerging from technical proposals and among participants rather than hierarchical oversight. Funding for I2P derives exclusively from private donations, eschewing tax advantages, corporate sponsorships, or direct government support to maintain independence from institutional influences. Notable contributions include a $5,000 donation from in March 2014, the largest single gift received at that time, allocated toward general project sustainability. While occasional targeted grants, such as those from the for usability enhancements, have supported specific initiatives, the core network relies on voluntary contributions without reliance on public funds or fiscal incentives. Operational transparency is evident in practices like reseed server support, where volunteers hosting bootstrap nodes for network integration may receive partial expense reimbursements post-verification, governed by public policies that detail eligibility and prohibit advance payments to prevent abuse. This approach sustains infrastructure without compromising the project's volunteer ethos or introducing dependencies that could introduce biases or oversight from funded entities.

Events and Conferences

The inaugural I2PCon occurred in , , on August 15–16, 2015, marking the first conference dedicated to the Invisible Internet Project (I2P). Hosted by the local Hacklab, the event combined public sessions on privacy technologies with developer-focused meetings and technical presentations. Proceedings included talks on I2P's routing mechanisms, anonymity properties, and practical implementations, with materials such as slides and videos made publicly available to support empirical evaluation of the network's design. I2PCon served as a platform for addressing operational challenges in anonymous networks, including discussions on peer selection and tunnel stability that inform responses to real-world deployment issues. Subsequent analyses of I2P's architecture, such as those examining assumptions in overlays, build on the foundational technical exchanges initiated at such gatherings, highlighting systemic vulnerabilities where geographic clustering undermines intended . These events have facilitated community-driven advancements by enabling direct collaboration among developers, contributing to iterative improvements in I2P's resilience without reliance on external publicity. While no annual I2PCon has followed the edition, the model underscores I2P's emphasis on decentralized, expertise-focused forums for validating network health through verifiable data and protocol critiques.

Ecosystem Terminology

Eepsites denote websites hosted anonymously within the I2P network, functioning as hidden services accessible solely via I2P-compatible clients; the term derives from the phonetic pronunciation of "I2P" as "eeps," emphasizing their integration into the closed I2P ecosystem rather than public internet exposure. These services rely on cryptographic identifiers ending in .i2p, enabling hosting without reliance on clearnet infrastructure. Garlic routing refers to I2P's packet forwarding method, which extends by bundling multiple messages into "cloves" encapsulated in layered "bulbs," allowing for variable payloads, padding, and delayed delivery to thwart ; the evokes garlic's clustered structure, contrasting onion routing's singular layered approach, and supports efficient anonymization in a fully internal . The netDB, or network database, constitutes I2P's decentralized repository for router identities and destination lease sets, propagated via floodfill among specialized routers to distribute directory functions and eliminate single points of failure or . Tunnels describe I2P's ephemeral, unidirectional communication paths comprising 2-3 through selected routers, with distinct inbound tunnels for receiving data and outbound for sending, designed to isolate flows and minimize attacks inherent in bidirectional circuits.

Security and Privacy

Anonymity Strengths and Empirical Evidence

I2P employs garlic routing to enhance endpoint anonymity by bundling multiple messages into encrypted "cloves" that are layered within unidirectional tunnels, making more difficult than in systems routing individual packets, as intermediaries cannot easily distinguish or disassociate bundled payloads from origins or destinations. This mechanism supports internal communications by routing data exclusively within the network, eliminating exposure to external surveillance points inherent in exit-node architectures. The protocol's decentralized topology, lacking central directories or authoritative nodes, resists single-point failures and targeted disruptions, with empirical measurements indicating sustained operation amid churn rates where up to 14,000 of approximately 32,000 daily active routers operate behind or firewalls without compromising overall connectivity. A 2025 computational analysis modeling I2P's overlay across , scale-free, and theoretical topologies found the network retains significant resilience to both random node failures and adversarial attacks on peer paths, preserving properties through distributed even under moderate compromise scenarios. For hidden services, I2P's garlic-based provides stronger causal of endpoints compared to reliance on network scale alone, as bundling and padding obscure timing patterns independently of user volume, enabling reliable internal publishing and exchanges without the deanonymization risks posed by clearnet egress. Protocol evaluations confirm this design's efficacy in maintaining untraceable streams, with audits highlighting reduced vulnerability to attacks due to the absence of fixed points or dependencies.

Identified Vulnerabilities and Attacks

In 2013, researchers demonstrated practical deanonymization attacks against I2P by exploiting the netDB verification protocol, which links storage and retrieval connections through observable timing delays of approximately 20 seconds. An attacker controlling just 10 malicious floodfill nodes—representing about 7% of the roughly 320-350 total floodfill nodes at the time—could attribute database lookups with around 52% accuracy per query, rising to over 80% success probability for users accessing a specific resource seven or more times daily under conservative assumptions of low false positive rates. These attacks required limited resources and revealed victim addresses, access timestamps, and session durations, primarily through Sybil-induced control of keyspace regions rather than exhaustive compromise. The same study also outlined floodfill takeover techniques, where passive exploitation of natural churn or targeted denial-of-service could replace up to 95% of automatically selected floodfill nodes using only 2% of the total network's nodes (about 258), enabling broader attacks that blocked eepsite access for up to 42 hours with minimal legitimate connectivity. In response, I2P implemented mitigations including raising the floodfill threshold to 500 nodes, imposing per-node limits, and adding subnet-based restrictions to reduce Sybil influence and improve peer diversity. Forensic examinations have identified persistent artifacts from I2P operations that enable post-incident detection and activity reconstruction on seized systems. Researchers generated and hash libraries from I2P installer components (e.g., via reverse-engineering and IzPack archives with scripts) for integration into tools like , allowing reliable identification of installed I2P instances through stable digital certificates and file signatures. Activity history can be inferred from addressbook files by comparing default entries against seized versions to detect manual eepsite additions, corroborated by subscription logs containing timestamps and sources; these artifacts arise causally from non-volatile storage of configurations, caches, and update metadata that I2P does not fully obfuscate or encrypt by default. A analysis exposed vulnerabilities in I2P's assumed spatial abstraction, where the network fails to fully decouple from underlying geography, leading to location-dependent peer distributions and latencies. Deploying routers across (e.g., , Germany, Japan) revealed stark disparities, such as 2,373 peers visible from the versus 116 from Japan, with statistical tests (Kolmogorov-Smirnov p-values as low as 1.6088 × 10⁻⁶) confirming non-uniform views dominated by regions like the , Russia, and Germany (comprising ~50% of peers). This clustering reduces effective mixnet density in underrepresented areas, heightening risks of traffic and deanonymization via geographic inference, as latency and peer selection heuristics inadvertently leak positional signals.

Criticisms and Limitations

I2P's smaller user base, estimated in the tens of thousands of active routers as of recent measurements compared to Tor's millions of daily users, heightens vulnerability to attacks, where an adversary with significant control could more feasibly deanonymize by linking entry and exit points due to lower overall and . This contrasts with Tor's scale, which dilutes such risks through greater in aggregated flows, though I2P's distributed netdb and short-lived tunnels provide some against global observers. The network's design, emphasizing unidirectional garlic-routed tunnels rebuilt frequently for , results in slower speeds and higher latency than for tasks like web browsing or file downloads, with empirical tests showing I2P underperforming in throughput and page load times due to overhead from layers and peer selection variability. Users report download speeds often limited to under 1 Mbps without optimized sharing, tied to the trade-off prioritizing internal resilience over clearnet outproxy efficiency. I2P exhibits a steeper than , requiring manual configuration of router settings, parameters, and integration with applications, which usability studies identify as barriers for non-technical users unfamiliar with concepts like allocation or netdb flooding. This complexity stems from its decentralized, application-agnostic , demanding active participation as a router rather than plug-and-play access. While I2P facilitates internal services including of copyrighted and other restricted materials, its enclosed eepsite ecosystem and lack of prominent clearnet bridges reduce external visibility, potentially evading the intensive directed at 's higher-profile nodes. Proponents argue this obscurity bolsters longevity against institutional targeting, as the network's lower media and academic footprint avoids drawing equivalent adversarial resources.

Reception and Impact

Comparisons with Alternatives

I2P differs fundamentally from in its architectural focus and routing mechanisms. Whereas employs to construct circuits primarily for accessing the clearnet via exit nodes, I2P utilizes garlic routing, which bundles multiple encrypted messages—or "cloves"—into single packets for unidirectional, short-lived tunnels optimized for internal communications and hidden services known as eepsites. This design prioritizes applications that remain within the network, such as anonymous file sharing or messaging, avoiding the deanonymization risks associated with 's exit traffic exposure to external observers. Empirical performance comparisons highlight trade-offs in and . Accessing I2P eepsites typically incurs lower than Tor's onion services for internal requests, as I2P's distributed floodfills and garlic bundling reduce overhead for hidden service rendezvous compared to Tor's circuit-based introductions. However, Tor generally outperforms I2P for clearnet-bound tasks like or downloads due to its larger . As of April 2025, Tor supports millions of daily users, enabling better load distribution and resilience, while I2P's active user base remains around 40,000 to 60,000 daily, with approximately 72,000 nodes—limiting and increasing vulnerability to targeted attacks on a smaller pool of peers. I2P offers causal advantages in censorship resistance for scenarios, as its lack of routine nodes minimizes attacks that plague when blending internal and external flows; all communications stay encapsulated within the overlay, enhancing isolation against nation-state adversaries monitoring clearnet boundaries. In contrast, 's clearnet emphasis provides easier onboarding for users seeking public but exposes operators to legal pressures on s, potentially compromising broader sets. I2P's internal focus, however, demands outproxies for any external reach, which are scarce and introduce similar risks, underscoring its niche suitability over 's versatility.
MetricI2PTor
Primary UseInternal services (eepsites, )Clearnet access via exits, onion services
Routing (bundled, unidirectional tunnels) (circuit-based, bidirectional)
Daily Users (2025 est.)40k–60k2M+
Hidden Service LatencyLower for internal Higher due to

Adoption Patterns and Use Cases

I2P's adoption remains niche, concentrated among enthusiasts, software developers, and communities prioritizing end-to-end over ease of access to clearnet resources. Empirical network measurements from router crawls show the active peer count expanding from 25,795 nodes in January 2019 to 72,653 nodes by April 2025, indicating gradual scaling driven by demand for resilient, garlic-routed overlays. This growth pattern is substantiated by distributed crawling techniques that map router connectivity and floodfill peer distribution, revealing a self-organizing resilient to partial node failures but limited by dependencies in low-density regions. Unlike broader s, I2P's user base favors technical users configuring persistent tunnels for internal services, with adoption patterns skewed toward environments requiring persistent , such as hosting. Primary use cases center on untraceable via applications like I2PSnark, which distribute content across encrypted tunnels to evade . Decentralized systems, such as I2P-Bote, enable store-and-forward messaging without reliance on centralized providers, supporting offline-capable, censorship-resistant communication for activists and dissidents in restrictive regimes. Eepsites—anonymous websites hosted exclusively within the I2P overlay—facilitate hidden service deployment for forums, blogs, and resource sharing, with crawls identifying over 1,800 active sites as early as 2017, correlating with post-2020 network expansion as users migrate from vulnerable clearnet alternatives. These deployments underscore I2P's role in sustaining independent information flows, particularly for whistleblowers and journalists transmitting sensitive data via encrypted streams immune to ISP-level interception. In cryptocurrency ecosystems, I2P supports private trading platforms and wallet interactions through anonymized protocols, reducing traceability in decentralized exchanges operating as eepsites or IRC channels. Hacker communities leverage it for collaborative code repositories and vulnerability discussions, with empirical evidence from darknet market crawls showing I2P's integration in underground resource trading since the early . Overall, these patterns highlight I2P's utility in fostering autonomous, state-independent channels for expression and exchange, though scalability constraints cap mainstream uptake.

Controversies and Societal Implications

I2P has been associated with facilitating illicit activities, including marketplaces for contraband and illegal services, as evidenced by forensic analyses identifying distribution and exchanges of prohibited materials within its network. A 2017 case study highlighted I2P's use in harboring malicious content and illegal online operations, complicating investigations due to encrypted traffic and ephemeral data artifacts that evade standard . These associations stem from I2P's design for , internal communication, which, while intended for , has empirically supported platforms akin to those on , though on a smaller scale with slower . Proponents argue against conflating the tool's with criminal intent, emphasizing that networks inherently enable both legitimate evasion of and misuse, without evidence that I2P's developers endorse illegality. Regulatory scrutiny has intensified around deanonymization challenges, with reporting difficulties in attributing actions due to I2P's layered and lack of centralized entry points, unlike more observable clearnet traffic. Monitoring efforts, such as simulated experiments on I2P services, demonstrate potential for to correlate user behaviors, yet real-world takedowns remain rare compared to , underscoring I2P's relative obscurity as both a strength and a barrier to widespread abuse detection. Critics from communities contend that such tools lower barriers to untraceable , including drug trafficking and data leaks, but empirical data shows no disproportionate criminal dominance; instead, I2P's traffic includes mundane file-sharing and privacy-focused applications, countering narratives of inherent "evil" facilitation. Societally, I2P bolsters resistance to in restrictive environments, enabling users in authoritarian contexts to access blocked information via its decentralized structure, as probabilistic models indicate resilience against blocking of peers, though not immune to large-scale . This utility aligns with broader net freedom goals, allowing dissidents and journalists to communicate without state , with studies confirming its role in bypassing firewalls in censored regions. However, this same opacity raises concerns over accountability for harms like child material distribution, prompting debates on whether enhanced traceability mandates infringe on or are warranted for , without resolution in as of 2025. Balanced assessments note that while misuse occurs, I2P's empirical footprint in verified crime cases is limited relative to its total usage, prioritizing design-driven over selective prohibitions.

References

  1. [1]
    Intro - I2P
    The I2P network is a fully encrypted peer-to-peer overlay network. An observer cannot see a message's contents, source, or destination.
  2. [2]
    20 Years of Privacy: A Brief History of I2P - Blog
    Aug 28, 2021 · It started as a “desire for instant communication with other Freenet users to talk about Freenet issues, and exchange Freenet keys while still maintaining ...
  3. [3]
    I2P: A scalable framework for anonymous communication
    I2P is a scalable, self organizing, resilient packet switched anonymous network layer, upon which any number of different anonymity or security conscious ...
  4. [4]
    Performance History - I2P
    Notable performance improvements have been made using the techniques below. There is more to do, see the Performance page for current issues and thoughts.
  5. [5]
    Full article: The dark side of I2P, a forensic analysis case study
    Jun 12, 2017 · In this work, we examine the characteristics of I2P networks and related applications that attract illegal activities and pose a problem for the forensic ...Missing: controversies | Show results with:controversies
  6. [6]
    I2P: The Censorship Resistant Anonymous P2P Network is 20 Years ...
    Mar 6, 2022 · In the years that followed I2P developed into a network layer that allows applications to use anonymous connections. This prevents outsiders ...
  7. [7]
    Roadmap - I2P
    This is an archive of the roadmap for I2P over the course of it's history. 2016 - 2020 Releases. 0.9.24. Released: January 27, 2016.0.9. 40 · 0.9. 45 · 0.9. 47
  8. [8]
  9. [9]
    20 Years of Privacy: A brief history of I2P - The Invisible Internet Project
    Aug 26, 2021 · The new build protocol required new I2NP messages and a hard cutover or “flag day”. These changes were released in version 0.6.1.10 on February ...
  10. [10]
    SSU2 Transport - Blog - I2P
    Oct 11, 2022 · SSU2 is a modern UDP protocol designed for high security and blocking resistance, replacing SSU, and will be enabled in the next release.Missing: app | Show results with:app
  11. [11]
    New I2P Routers - Blog
    Oct 16, 2025 · It's an exciting time for I2P development, our community is growing and there are now multiple new, fully-functioning I2P router prototypes ...
  12. [12]
    Inside I2P: The Underground Internet Shielding Users in 2025
    Mar 31, 2025 · According to the latest data from Stats.i2p, the network hosts around 12,000 active nodes a 20% increase from 2022. Growth has been steady, if ...Missing: developments | Show results with:developments
  13. [13]
    Resilience of the Invisible Internet Project: A Computational Analysis
    Aug 14, 2025 · The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic ...Missing: developments | Show results with:developments
  14. [14]
    Mapping the Invisible Internet: Framework and Dataset - ScienceDirect
    Oct 15, 2025 · This article describes a novel dataset that maps the network layer of the Invisible Internet Project (I2P). The data was collected using ...
  15. [15]
    Download - I2P
    Here is a helpful guide to installing I2P for Windows using a separate Java installation and the classic installer.
  16. [16]
    I2P | F-Droid - Free and Open Source Android App Repository
    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate.Missing: 2015 | Show results with:2015
  17. [17]
    Roadmap - I2P
    1.5.0 (API 0.9.51) · Accelerate rekeying routers to ECIES · Start work on SSU2 · Implement new tunnel build messages (proposal 157) · Support dmg and exe automatic ...Missing: milestones | Show results with:milestones
  18. [18]
    Tunnel Routing - I2P
    I2P builds virtual "tunnels" - temporary and unidirectional paths through a sequence of routers. These tunnels are classified as either inbound tunnels.Overview · Tunnel Build Information · Tunnel LengthMissing: architecture | Show results with:architecture
  19. [19]
    Unidirectional Tunnels - I2P
    I2P's undirectional tunnels expose half as much traffic data than would be exposed with bidirectional circuits by simply looking at the flows themselves.
  20. [20]
    Garlic Routing - I2P
    Michael Freedman defined "garlic routing" as an extension to onion routing, in which multiple messages are bundled together.Garlic Routing And... · ``garlic'' Methods In I2p · End-To-End Message BundlingMissing: precursors influence
  21. [21]
    The Network Database - I2P
    I2P's netDb is a distributed database containing router contact information (RouterInfos) and destination contact information (LeaseSets).Missing: achievements | Show results with:achievements<|separator|>
  22. [22]
    [PDF] Monitoring the I2P network - HAL Inria
    Every tunnel is unidirectional, and is formed by the gateway (entry point), a set of participants (intermediate nodes) and an endpoint. Additionally, two types.
  23. [23]
    Tunnel Implementation - I2P
    To allow efficient operation, the router maintains a series of tunnel pools, each managing a group of tunnels used for a specific purpose with their own ...
  24. [24]
    Performance - I2P
    The I2P network is fully dynamic. Each client is known to other nodes and tests locally known nodes for reachability and capacity. Only reachable and capable ...Missing: achievements | Show results with:achievements
  25. [25]
    [PDF] Outproxies in I2P
    The only difference is that the Tor network has more exit nodes than I2P outproxies. It is therefore recommended that you use Tor to surf the Clearnet. Glossary.Missing: inproxies | Show results with:inproxies
  26. [26]
    I2P Network Protocol (I2NP)
    I2NP manages routing and mixing of messages between routers, and can be used for one-hop, router-to-router, point-to-point messages.I2np Definition · Message Format · Message TypesMissing: architecture | Show results with:architecture
  27. [27]
    ElGamal/AES + SessionTag Encryption - I2P
    ElGamal/AES+SessionTags is end-to-end encryption using ElGamal for keying, AES for payload, and session tags for subsequent messages.
  28. [28]
    Low-level Cryptography Specification - I2P
    This page specifies the low-level details of the cryptography in I2P. There are several cryptographic algorithms in use within I2P.Missing: management | Show results with:management
  29. [29]
    Tunnel Creation Specification - I2P
    This document specifies the details of the encrypted tunnel build messages used to create tunnels using a non-interactive telescoping method.
  30. [30]
    ECIES-X25519-AEAD-Ratchet - I2P
    It supports new encryption for end-to-end, destination-to-destination communication. The design uses a Noise handshake and data phase incorporating Signal's ...Missing: management | Show results with:management
  31. [31]
    i2p/i2p.i2p - GitHub
    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several ...Missing: mid- 2000s
  32. [32]
    CVE-2020-13431 I2p Windows Local Privilege Escalation
    May 29, 2020 · This vulnerability has been found in the latest version 0.9.45 but affected i2p since 0.7 series of releases from over a decade ago. I2P ...
  33. [33]
    Software Update Specification - I2P
    I2P uses a simple, yet secure, system for automated software update. The router console periodically pulls a news file from a configurable I2P URL.Missing: early history
  34. [34]
    I2P 2.10.0 Release - Blog
    Sep 8, 2025 · I2P 2.10.0 includes post-quantum cryptography (not default), I2PSnark UDP tracker support, Hidden Mode stability improvements, and requires ...Missing: 2010 | Show results with:2010
  35. [35]
    Reseed Hosts - I2P
    Reseed hosts are needed for new routers to integrate with the I2P network. During the bootstrapping process, reseed hosts provide an initial set of nodes.Missing: decentralized policies
  36. [36]
    Help your Friends Join I2P by Sharing Reseed Bundles - Blog
    Jun 7, 2020 · Most new I2P routers join the network by bootstrapping with the help of a reseed service. However, reseed services are centralized and ...Missing: mechanism | Show results with:mechanism
  37. [37]
    Protocol Stack - I2P
    The I2P protocol stack includes Internet, Transport, I2P Transport, Tunnel, I2P Garlic, and Client layers, each providing extra capabilities.Missing: features | Show results with:features
  38. [38]
    [PDF] A Real-World Case Study using I2P - grothoff.org
    Exploratory tunnels are for routerInfo queries to the netDB and for tunnel management. They are not used for privacy-sensitive operations. Client tunnels ...
  39. [39]
    I2P - Gentoo Wiki
    I2P selects a random port between 9000 and 31000 for inbound traffic when the router is first run. This port is forwarded automatically by UPnP, but if your ...
  40. [40]
    A Gentle Introduction to How I2P Works
    I2P is a network for secure, anonymous communication, acting as a secure IP layer where both sender and recipient are unidentifiable.Why? · How? · Who?
  41. [41]
    What is I2P: How to install + Use, Garlic Routing, Eepsites & I2P vs Tor
    Mar 12, 2018 · I2P is almost exclusively used to access eepsites sites instead of using it as an anonymous way to access the public internet.
  42. [42]
    I2P-Bote is a serverless, encrypted e-mail application. - GitHub
    I2P-Bote is a plugin for I2P that allows users to send and receive emails while preserving privacy. It does not need a mail server.
  43. [43]
    I2P-Bote
    May 16, 2019 · I2P-Bote is a plugin for I2P that allows users to send and receive emails while preserving privacy. It does not need a mail server.
  44. [44]
    Introduction - I2P/Bote Protocol - Read the Docs
    I2P/Bote is a serverless pseudonymous email exchange service for the I2P network. Emails are stored encrypted in a Kademlia DHT formed by all I2P-bote nodes. ...
  45. [45]
    I2PTunnel - I2P
    Only a whitelisted subset of IRC commands are allowed due to anonymity concerns. The following allow list is for commands inbound from the IRC server to the ...Client Modes · Transparent Response... · Irc Client
  46. [46]
    Anonymous IRC chats - i2pd documentation - Read the Docs
    Connect to anonymous IRC server​​ You can connect to IRC servers in I2P by using Socks proxy. By default, it listens at 127.0. 0.1:4447 (look at configuration ...
  47. [47]
    frequently asked questions - Syndie
    Forum Frequently Asked Questions: Why does Syndie matter? (up) What do forum/blogging tools have to do with providing strong anonymity? The answer: everything.
  48. [48]
    Syndie 1.105b Release - Blog - I2P
    Add script for the hsqldb database manager tool; More code refactoring; New translations: Polish, Portuguese, Romanian; Translation updates.
  49. [49]
    use cases - Syndie
    Syndie treats all identifying information as sensitive - unlike most software, Syndie ... tools like I2P, Tor, Mixminion, and Freenet to enhance your privacy. "My ...
  50. [50]
    An Empirical Study of the I2P Anonymity Network and its Censorship ...
    Sep 24, 2018 · Using the collected network data, we examine the blocking resistance of I2P against a censor that wants to prevent access to I2P using address- ...Missing: eepsites publishing
  51. [51]
    An Empirical Study of the I2P Anonymity Network and its Censorship ...
    Despite the decentralized characteristics of I2P, we discover that a censor can block more than 95% of peer IP addresses known by a stable I2P client by ...Missing: controversies | Show results with:controversies
  52. [52]
    Intro - I2P
    It includes a router, applications, and the ability to manage and customize your own connection with the I2P network using a built in Hidden Services manager.Missing: Syndie eepsites
  53. [53]
    Share and Download Torrents Anonymously with I2P
    Jun 1, 2025 · Step-by-step guide to sharing and downloading torrents anonymously with I2P and I2PSnark. Ensure secure, private P2P file transfers.
  54. [54]
    BitTorrent over I2P for anonymous file sharing - HackYourMom
    Nov 10, 2023 · Note: I2PSnark changes its I2P ID every time it is launched, which is visible to other file sharing participants. Download files and create ...
  55. [55]
    [PDF] I2P's Usage Characterization - ResearchGate
    Abstract. We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing.Missing: adoption rates
  56. [56]
    Streaming Protocol - I2P
    The I2P streaming protocol provides TCP-like streams over I2P, enabling reliable, in-order, and authenticated message streams, similar to TCP.Missing: features | Show results with:features
  57. [57]
    I2P Compared to Tor
    The two primary differences between Tor / Onion-Routing and I2P are again related to differences in the threat model and the out-proxy design (though Tor ...Tor / Onion Routing · Comparison Of Tor And I2p... · Benefits Of I2p Over Tor
  58. [58]
    How many people use i2P per day? - Reddit
    Nov 22, 2024 · Probably something around 40-60k daily, and another 40k or so who are around enough to be noticed on the network but aren't always online.Number of users on I2P vs "regular" torrents?How to Improve I2P torrent Upload SpeedsMore results from www.reddit.com
  59. [59]
    [PDF] I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison
    The results show that I2P can only yield advantages to TOR when issuing simple HTTP-GET-Requests, but is inferior to TOR when browsing complete web sites and ...
  60. [60]
  61. [61]
    I2P for Android - GitHub
    The build system is based on Gradle. There are several methods for setting Gradle up: It can be downloaded from the Gradle website.Missing: 2015 | Show results with:2015
  62. [62]
    Embedding I2P in your Application
    This page is about bundling the entire I2P router binary with your application. It is not about writing an application to work with I2P (either bundled or ...
  63. [63]
    Configuring Privacy Browser for I2P on Android
    Configuring Privacy Browser for I2P on Android · 1. Open the main menu and tap “Settings” · 2. Disable Javascript(Recommended) · 3. Enable Incognito Mode(Optional).
  64. [64]
    Run a Monero node through I2P with I2P-zero
    Run your own seed node (known as a 'mipseed') to help other people discover I2P-accessible Monero nodes, follow instructions in the i2p-zero repo.Missing: cryptocurrency | Show results with:cryptocurrency
  65. [65]
    Tor and I2P - Monero Docs
    You will be able to connect your desktop and mobile Monero wallets to your own trusted Monero node, in a secure and private way over Tor or I2P.
  66. [66]
    Monero Node - Comfy.Guide
    Jul 7, 2024 · Monero nodes cannot sync the blockchain over Tor or I2P, but the node can broadcast transactions and let users connect over these ...Installation · Configuration · Making a Public Node · Tor/I2P Setup
  67. [67]
    Configuring IRC Software - I2P
    To configure any IRC client to chat on Irc2P, first, make sure that your IRC tunnel is available. Visit the Hidden Services Manager and look for Irc2P in your ...<|separator|>
  68. [68]
    Get Involved - I2P
    Contribute to the I2P Network, Host Services for Yourself and Others, Develop and Test Software, Join I2P On Gitlab, Mastodon, Reddit, Twitter, Gitlab.
  69. [69]
    Search Engine DuckDuckGo Awards Invisible Internet Project $5000
    Mar 12, 2014 · This marks the single largest donation ever received by I2P and reflects a growing interest in privacy and security by the Internet community.
  70. [70]
    0.9.12 Release - Blog - I2P
    Mar 31, 2014 · 0.9.12 adds preliminary support for ECDSA-signed Destinations. It contains several fixes for the handling of Delivery Status Messages ( ...Missing: milestones | Show results with:milestones<|separator|>
  71. [71]
    I2P Reseed Server Policy Requirements and Guidelines
    Requirements · Well integrated running I2P router @ 24/7 · Server with static IPv4 (2 cpu/ 2GB ram is fine) · Unix to run the golang solution · Own domain, sub- ...Missing: decentralized control
  72. [72]
    I2PCon - I2P
    The first conference dedicated to I2P was held in Toronto on August 15-16, 2015. See the link below for more information and links to slides and videos.
  73. [73]
    I2PCon 2015 - I2P
    I2PCon 2015 was the first event of its kind. It had two short-term goals. First, to provide the general public with an event where knowledge about privacy ...
  74. [74]
    Invisible Internet Project and Spatial Restrictions: A Systemic ...
    Sep 15, 2025 · The Invisible Internet Project (I2P) is a peer-to-peer overlay network that assumes complete abstraction of the Internet's spatial distribution.
  75. [75]
    Frequently Asked Questions - I2P
    I2P is a Java-based anonymous network where traffic is encrypted, and I2P sites are hidden websites accessed through a web proxy.
  76. [76]
    Network Database Discussion - I2P
    I2P's netDb is very different from traditional load bearing DHTs - it only carries network metadata, not any actual payload, which is why even a netDb using a ...Missing: management | Show results with:management
  77. [77]
    An Empirical Study of the I2P Anonymity Network and its Censorship ...
    We find that there are currently around 32K active I2P peers in the network on a daily basis. Of these peers, 14K are located behind NAT or firewalls. Using the ...
  78. [78]
    I2P's Threat Model
    I2P is a free route mixnet - the message creator explicitly defines the path that messages will be sent out (the outbound tunnel), and the message recipient ...
  79. [79]
    [PDF] Practical Attacks Against The I2P Network - UCSB Computer Science
    Applications can either use a TCP-like protocol called NTCP or a UDP-like protocol called SSU. The router maps these connections to packet-based I2P tunnels.
  80. [80]
    [PDF] Forensic Analysis of I2P Activities
    Furthermore, we present new methods to detect the presence of. I2P using forensically approved tools and reconstruct the history of I2P activity using artefacts ...
  81. [81]
    [PDF] Invisible Internet Project and Spatial Restrictions - Authorea
    Sep 15, 2025 · This study hypothesizes that I2P adheres to spatial restrictions. To test the hypothesis, we conducted a monitoring experiment using Google ...Missing: flaws | Show results with:flaws
  82. [82]
    (PDF) A comprehensive behavior analysis of TOR versus I2P
    Aug 7, 2025 · ... I2P is less. known and has a smaller user base, which might be. geographically more centred around Central Europe. Table 1. Mean TOR users acr ...
  83. [83]
  84. [84]
    The Other Dark Nets - OSINT Combine
    Nov 22, 2022 · I2P uses something called 'garlic routing', which means that packets ... I2P and Freenet, users themselves act as routers and store data).
  85. [85]
    Q & A: What is garlic routing and how is it different from onion routing?
    Mar 22, 2021 · Garlic Routing is a variant of Onion Routing which I2P (Invisible Internet Project) uses. The fundamentals of garlic routing and garlic ...
  86. [86]
    What Is I2P & How Does It Compare With Tor Browser in 2023? - Blokt
    Dec 5, 2023 · Accessing I2P's eepsite hidden services is generally faster than accessing Tor's Onion (hidden) Services. Tor is a much larger and more mature ...
  87. [87]
    Tor Stats 2025 - TrueList
    Feb 17, 2024 · Over 2 million users access the Tor platform daily. · Visits to the dark web account for only 1.5% of the entire Tor traffic. · Only 45% of ...
  88. [88]
    Examining I2P Resilience: Effect of Centrality-based Attack - arXiv
    Sep 23, 2025 · This study examines the robustness of I2P, a well-regarded anonymous and decentralized peer-to-peer network designed to ensure anonymity, ...
  89. [89]
    An Introduction to Tor vs I2P - IVPN
    Tor provides one with better anonymous access to the open internet and I2P provides one with a more robust and reliable 'network within the network'.
  90. [90]
    I2P vs Tor 2025 - Online Anonymity Explained & Compared
    Both Tor and I2P offer users a great deal of anonymity and security, but there are some differences to keep in mind. For starters, Tor is faster than I2P, but ...
  91. [91]
    I2P vs Tor in 2025 [Online Anonymity Explained & Compared]
    Apr 25, 2025 · Garlic routing is the solution to this problem. Instead of sending messages individually like in onion routing, garlic routing bundles multiple ...What Is I2p? · Onion Routing Vs Garlic... · I2p And Tor Vs Vpn
  92. [92]
    Examining I2P Resilience: Effect of Centrality-based Attack - arXiv
    Sep 23, 2025 · Abstract:This study examines the robustness of I2P, a well-regarded anonymous and decentralized peer-to-peer network designed to ensure ...Missing: protocol audits resistance
  93. [93]
    I2P Anonymous Network
    The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative.
  94. [94]
    Large-scale discovery and empirical analysis for I2P eepSites
    An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. Preprint. Sep 2018. Nguyen Phong Hoang ...Missing: publishing | Show results with:publishing
  95. [95]
    I2P Anonymous Proxy Definition - FraudNet
    I2P (Invisible Internet Project) Anonymous Proxy is a decentralized, peer-to-peer network designed to provide secure and anonymous communication over the ...
  96. [96]
    [PDF] Hackers Are Moving
    Jun 2, 2022 · The crawler has been used to collect a snapshot from eight DNMs accessible through I2P or TOR. The snapshot covers two months of data from ...<|control11|><|separator|>
  97. [97]
    The dark side of I2P, a forensic analysis case study - ResearchGate
    Specifically, we investigate the characteristics of I2P networks in order to outline the security flaws and the issues in detecting artefacts within the I2P.Missing: controversies criticisms
  98. [98]
    The rise of I2P - American Police Beat Magazine
    Aug 17, 2023 · Comparing the vast and expansive Tor network, I2P is dwarfed by the bandwidth Tor offers, which is why the network traffic is much slower.
  99. [99]
    Monitoring an anonymity network: Toward the deanonymization of ...
    In this paper we describe the infrastructure we have designed and implemented for monitoring the Invisible Internet Project (I2P) network.
  100. [100]
    Monitoring an Anonymity Network: Toward The Deanonymization of ...
    Nov 23, 2021 · I will then introduce the results of our simulated experiments conducted on the I2P anonymity network, and then we will discuss the conclusions.Missing: enforcement | Show results with:enforcement
  101. [101]
    The dark side of I2P, a forensic analysis case study
    Feb 24, 2023 · Specifically, we investigate the characteristics of I2P networks in order to outline the security flaws and the issues in detecting artefacts ...
  102. [102]
    [PDF] An Empirical Study of the I2P Anonymity Network and its Censorship ...
    Tor and I2P are the most popular low-latency anonymous communication networks, which use the onion routing technique [56] to protect user anonymity. Although ...
  103. [103]
    2018 ICFP Wrap up | OTF - opentech.fund
    Oct 16, 2020 · I2P can be used by privacy-conscious Internet users to protect their online privacy, or by censored users to bypass censorship. Phong carried ...
  104. [104]
    Darknets and Hidden Services - IOCTA 2016 - Europol
    This section looks at the criminal use of anonymising peer-to-peer networks such as Tor, I2P and Freenet. These networks are often referred to as 'Darknets'.Missing: association | Show results with:association
  105. [105]
    An Empirical Study of the I2P Anonymity Network and its Censorship ...
    Sep 25, 2018 · Using the collected network data, we examine the blocking resistance of I2P against a censor that wants to prevent access to I2P using address- ...