I2P, an excellent option for anonymity in the network

I2P (Invisible Internet Project) is a software that offers an abstraction layer for communications between computers, thus allowing the creation of network tools and applications with strong anonymity. Its uses include anonymous web pages (eepsitees), chat servers and clients, blogging, file transfers, it is also a network that adapts very well to p2p networks. I2P is free software and uses several free licenses.

Connection security is top-level. The I2P software establishes inbound and outbound proxy tunnels to other routers. Messages and data originating from your CPU travel through a series of exit tunnels before reaching their assigned destination. The data it extracts has traveled through a series of tunnels. The end result is end-to-end message encryption.

Unlike the famous "onion" routing by Tor, I2P uses "garlic" routing, that unlike tor routing that carries a single message as it traverses the network, in the I2P routing system, messages contain a series of encrypted messages, called “cloves”, which are broken when they reach their different Destinations.

Through this routing system, one-sided tunnels, and decentralized configuration, I2P creates a network that makes message tracking and hacking much more difficult than other anonymity networks.

The basic I2P client is written in Java and it can work on a wide range of platforms, such as Windows, Linux, macOS, Solaris, etc. Separately, I2pd, an implementation of the I2P client in C ++, is being developed.

About the new version of I2P 0.9.44

Currently the software is in its I2P 0.9.44 version, in which initial support for an end-to-end encryption method is proposed more reliable and faster packet-based ECIES-X25519-AEAD-Ratchet instead of ElGamal / AES + SessionTag. Although this implementation is offered for experiments only and is not ready for end users.

i2p-

The client i2psnark BitTorrent Offers New Media Players built-in HTML5-based and additional playlists for audio content.

Fixed a vulnerability that could lead to a denial of service when processing hidden types of new encryption types.

The routing code has been changed to support various types of encryption, in addition to the appearance of the console home page.

On the Windows platform, the data for new installations is now in the% LOCALAPPDIR% directory.

The problem with the tunnel construction, which caused start-up delays, has been resolved.

How to install I2P 0.9.44 on Ubuntu and derivatives?

As mentioned in the article, I2P has a .jar package which can be used in almost any system that has Java support.

Though In the case of Ubuntu, Debian as well as its derivatives, there are already built packages for easier installation. In this case, for those of us who use Ubuntu or any of its derivatives.

We can make use of a PPA, which we simply have to add to our system from a terminal (Ctrl + Alt + T) by executing the following command:

sudo add-apt-repository ppa:i2p-maintainers/i2p

sudo apt-get update

And we can install the software by typing:

sudo apt-get install i2p

For those who prefer to download the .jar file They can do it from a terminal and in it they execute:

wget https://download.i2p2.de/releases/0.9.44/i2pinstall_0.9.44.jar

And to carry out the installation we are going to execute the file with the following command:

java -jar i2pinstall_0.9.44.jar -console

Done this An installation wizard will open which basically we will have to give "next", "Next", "next" ... Within the installation steps we must pay attention to the path where IP2 is installed, since later we will use that path to start it with a script.

Done the installation simply we must type the following command, where they will replace "user" with the username of your system:

/home/usuario/i2p/i2prouter start

In addition, you can automate the execution of I2P with the following command:

sudo dpkg-reconfigure i2p

You can finally hang out for a while the documentation to know its use.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.