I2P is an anonymous, self-organized distributed Network Database network, which uses the modified DHT KADEMLIA, but differs in that it stores the hash addresses of the network, encrypted AES-addresses, as well as public encryption keys, and the Network Database compounds are also enciphended. The network provides applications with a simple transport mechanism for anonymous and protected messages to each other. Although the I2P network is strictly focused on the determination of the package transmission route, thanks to the Streaming LIB library, their delivery is also delivered to the original sequence without errors, losses and duplication, which makes it possible to use i2p IP-telephony, Internet radio, IP-television, video conferences and other flow protocols and services.
Inside the I2P network, its own catalog of sites [1], electronic libraries [2] [3], as well as torrent trackers [4] [5]. In addition, there are gates for access to the I2P network directly from the Internet [6] [8] [8] created specifically for users who, for various reasons, cannot install the software of the “Project invisible Internet” on the computer.
[edit] Network features

The I2P network is similar in its structure to the traditional Internet and is only characterized by the impossibility of censorship through the use of encryption and anonymization mechanisms. Therefore, for third parties, there is no way to find out what the user is looking at, what sites he visits, what information he downloads, what is his circle of interests, dating, etc. D.
There are no central servers and there are no familiar DNS servers in the I2P network, the network also does not depend on external DNS, which leads to the impossibility of destroying, blocking and filtering a network that will exist and function while at least two computers remain on the planet in the network. Also, the absence of DNS servers and the use of DHT Kademlia-the Name distribution mechanism in the I2P network-makes it possible to create an I2P of your site, project, torrent tracker, etc. D. Without the need to register somewhere, pay to someone a domain name or wait for someone’s permission. Each person is free to create any sites absolutely free and free, while finding out the location of the server and a person is almost impossible.
It is also worth noting that each person who has joined the I2P network increases the reliability, anonymity and speed of the entire network as a whole. To get to the I2P network, you just need to install a marchrutizer program on your computer, which will decipher/encrypt all traffic and redirect it to I2P network. In most cases, it is not required to configure the march-grinder program-it is already in default in the optimal way. The interface is completely translated into Russian. When contacting a site or other resource on a regular (external) Internet, a march-grinder program automatically like Tor paves a tunnel to one of the external gateways and makes it possible to anonymously visit and use external Internet resources. Also, internal sites on the i2p network are available from external Internet through special gateways.
At first glance, it may seem that the work of the I2P router due to the constant need to encrypt the outgoing and deciphering incoming packages and the use of a large number of encryption algorithms with long keys, should negatively affect the load of the processor and memory of the computer, in fact, the load does not even affect low-power office computers and is calculated by units of interest.
[edit] encryption on the network i2p

All traffic on the network is https://nonukcasinosites.co.uk/skrill/ encrypted from the sender to the recipient. In the amount of the message, four encryption levels (through, garlic, tunnel, as well as encryption of the transport level) are used, before encryption to each network package, a small random number of random bytes is automatically added to even more depersonal information and impede attempts to analyze the contents and blocking the transmitted network packages. Cryptographic identifiers consisting of a pair of cryptographic public keys are used as a network addresses. IP addresses on the I2P network are not used anywhere and never, so it is not possible to determine the true address of any unit on the network. Each network application on a computer builds for itself separate encrypted, anonymous tunnels. Tunnels are mainly unilateral type (outgoing traffic goes through one tunnels, and entering through others) – direction, length, as well as which application or service created these tunnels is almost impossible to find out. All transmitted network packages tend to diverge into several different tunnels, which makes it meaningless attempts to listen and analyze with the help of a sniffer that is a passing stream of data. There is also a periodic change (approximately every 10 minutes) of already created tunnels to new, with new digital signatures and encryption keys (digital signatures and encryption keys, of course, each tunnel).
For these reasons, there is no need to worry about the application programs to ensure encryption of their traffic. Or if there is a distrust of encrypting programs with closed source code (such as Skype). Also, for example, there are IP-telephony programs (such as Ekiga) that cannot encrypt their traffic and transmit it openly. In any case, the I2P network will produce four -level encryption of all packages and protect the transfer/reception of all data.
On the i2p network, all packages are encrypted on the senior side and deciphered only on the side of the recipient, while unlike Tor none of the intermediate participants in the exchange has the opportunity to intercept the decoded data and none of the participants know who the sender is actually and who the recipient is, since the node transmitting the packet can be the sender, and it can be the same intermediate knot, and the next unit should be sent this package to be sent the recipient, or maybe the same intermediate knot, can not find out the end points of the sender and recipient the intermediate node in any way, just as he cannot find out what happened to the next node just transferred by the package – whether he processed it or transferred it somewhere further, it is impossible to find out.
The I2P networks use (for different levels and protocols) the following systems and encryption and signature methods:
256 bits AES mode CBC with PKCS#5;
2048 bits El Hamal Scheme;
2048 bits algorithm Diffy – Hellman;
1024 bits DSA;
256 bits of the HMAC – an algorithm for increasing crypto resistance of other cryptoalgorithms;
256 bits hashing sha256.
[edit] History of the I2P network

Project I2P was started in 2003 to support everyone who participates in the creation of a more free society and is interested in a new obscene, anonymous and safe means of communication and dissemination of information. I2P is an attempt to create a protected decentralized anonymous network with a low response time and autonomy properties, failure tolerance and scalability. The ultimate task is the ability to function in harsh conditions, even under the pressure of organizations with significant financial or political resources. All aspects of the network are available in the form of the source code and are free. This allows users to make sure that the software is doing exactly what is stated and facilitates the third -party developers of the opportunity to improve the protection of the network from persistent attempts to limit free communication. The I2P developers team is an open group whose participant can become anyone who is interested in the project.
Many people from the I2P developers team previously participated in projects IIP (English.) and freeenet. But, unlike the latter, the “Invisible Internet project” is an anonymous single-rat distributed communication environment, with which any traditional network services and protocols can work, such as e-mail, IRC, http, Telnet, and distributed applications, such as databases, Squid and DNS.
Starting from version 0.7.2 (released in May 2009), the releases of the program are considered stable. Until May 2009, the authors of the project with all their forces kept users from the active advertising of the I2P network, indicating the possible instability and the BETA development status [9].
In 2009, nine updates were released, and the network traffic increased 5 times.

Using this network, you can download files without disclosing any information.

A file -income client was also released using this technology, namely Imule.It allows (when installing the main software i2p) to download or distribute on a torrent without disclosing any information about you.

*Who will need this absolutely does not matter … But if the pirates switch to this technology, the fight against piracy in RuNet will become very difficult or indeed impossible*