up:: [[Dark Web]]
# The Invisible Internet Project (I2P)
I2P (Invisible Internet Project) is a network layer that enables secure and anonymous communication over the internet. It uses a decentralized peer-to-peer network to allow users to send messages, chat, and use applications like web browsing and file sharing anonymously.
## How It Works
I2P operates by creating a network within the internet, functioning as an overlay network. It uses [[encryption]] and routing techniques that involve sending messages through a distributed network of computers (nodes). Each message is encrypted multiple times and sent through a unique pathway of relays, making the communication highly resistant to [[surveillance]] and traffic analysis.
### Key Components:
- **Garlic Routing:** Similar to onion routing, garlic routing bundles multiple messages together, providing enhanced security and efficiency.
- **Tunnels:** I2P establishes uni-directional tunnels for sending and receiving data, which helps conceal the network's internal structure and the identities of its users.
## Advantages
- **Anonymity:** Provides strong anonymity protections by encrypting data multiple times as it passes through various routers.
- **Decentralization:** Lacks central control points, reducing the risk of systemic failures and resisting censorship.
- **[[End-to-End Encryption]]:** Ensures that all communications are encrypted from source to destination, safeguarding data from eavesdropping.
- **Community Driven:** Supported and developed by an active community focused on privacy and resistance to censorship.
## Major Tools Used
- **I2P Router:** A key piece of software that connects users to the I2P network.
- **I2PSnark:** A built-in torrent client used for file sharing over I2P.
- **I2P-Bote:** A secure, decentralized email system entirely within the I2P network.
- **Susimail:** A webmail service designed for privacy and usability within I2P.
## Related Cybersecurity Policies
I2P itself is not governed by specific cybersecurity policies but is influenced by broader internet privacy and security standards:
- **[[General Data Protection Regulation (GDPR)]] ([[General Data Protection Regulation (GDPR)|GDPR]]):** While primarily EU legislation, it impacts global privacy practices and tools that enhance user privacy, like I2P, can help in achieving compliance.
- **United Nations Guidelines for Consumer Protection:** Emphasizes the protection of consumers' privacy on the internet, supporting the use of technologies like I2P that bolster user anonymity.
## Best Practices
- **Regular Updates:** Keep the I2P software and related applications updated to the latest versions to protect against vulnerabilities.
- **Secure Configuration:** Configure I2P router settings according to recommended security practices to optimize performance and anonymity.
- **Network Monitoring:** Although I2P is designed for anonymity, monitoring outbound and inbound connections for unusual activities can be crucial in a layered security approach.
## Current Status
I2P continues to evolve, with updates that enhance its security features, usability, and performance. It remains a vital tool for users who prioritize privacy and wish to protect their online activities from [[surveillance]] and analysis.
## Revision History
- **2024-04-14:** Entry created.