• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » How Invisible Internet Project (I2P) Works

By Abhishek Ghosh February 7, 2024 9:36 am Updated on February 7, 2024

How Invisible Internet Project (I2P) Works

Advertisement

I2P (Invisible Internet Project) is an encrypted, anonymous, pseudonymous and decentralized serverless computer network distributed worldwide.

I2P is based on free software and aims to provide a simple transfer layer with the benefit of anonymity and privacy, security from attacks, and resistance to censorship for various application software. I2P enables an anonymous, encrypted, and decentralized, peer-to-peer distributed communication layer designed to support any traditional protocol such as BitTorrent, HTTPS, SSH, XMPP, email, IRC, IPv4, and IPv6, as well as traditional distributed applications (e.g., Squid or DNS).

The I2P network itself is message-based (like IP), but it also offers a library that allows data transmission as well as streaming of information and is similar to TCP. In I2P, every data transmission is encrypted multiple times, and a total of four layers of encryption are used for each data packet. The receiving points (downloaders/receivers) of the data packets are also protected by the encryption method, most of which consist of a pair of public keys.

Advertisement

---

Data traffic is also routed in parallel through several different and constantly changing tunnels (network chains). Your own I2P router (I2P user) is thus also constantly involved in the simultaneous and alternating forwarding of several different and encrypted data packets for other I2P users. Given the high number of possible dynamic transport paths (the different and ever-changing network chains) that traffic can traverse, it is very unlikely that a third party will be able to observe a complete connection and monitor the data content.

For forwarding, the respective program running under I2P sends its data to the designated I2P router. The I2P router first ensures that the data is encrypted and anonymized for sharing. Subsequently, a route is determined via several third-party I2P routers to a currently valid transfer point of the target router. From there, the data is passed on via several I2P routers to the actual destination. The forwarding routers used in this process are called hops. For safety reasons, however, only your own hops are counted to the transfer point; The sender has no control over the number of hops determined by the target router.

Invisible Internet Project I2P

To ensure that no data is lost along the way, which can happen in the event of an I2P router failure in a chain of routers, it is sent again via a different route at the same time. Each of these routes corresponds to a tunnel. If the data was able to reach its destination in this way, this tunnel was successfully constructed.

The acknowledgment of receipt, in turn, is sent by the destination router via a new series of hops through new tunnels in the aforementioned manner. To determine the respective transfer points and announce the tunnel occupancy, a request is made to the distributed I2P network database, which maintains a structured distributed hash table (DHT) based on the Kademlia algorithm. After every eleven minutes, the tunnels are discarded and replaced by new ones. I2P uses 2048bit AES256/SHA256+ session tags encryption and Ed25519 EdDSA/ECDSA signatures.

 

Realization of Invisible Internet Project (I2P)

 

The core of the I2P application is written in Java. A Java runtime environment must therefore be installed. Furthermore, there is a complete implementation in C++ as well as other projects, some of which are in an early stage of development. Some of the services are integrated in the form of web applications and can be accessed via the browser. The central role here is played by the “router console” as the entry page.

Other services are partly realized by the fact that the I2P service works as a proxy for e.g. HTTP, IRC, Mail or Concurrent Versions Systems, whereby it sometimes behaves like a normal server towards the respective client. In this way, the normal client programs, such as Firefox, can be used, which only have to be reconfigured to your own I2P server/proxy. In most cases, different 4-digit port numbers are used. In addition, there are special add-on programs in the I2P network, which are listed in the Applications section.

I2PTunnel is an application embedded in I2P that allows arbitrary TCP/IP services to be provided via I2P.
SAM is a protocol that allows the development of I2P-based programs in a wider range of programming languages.
BOB is another interface that allows the development of I2P-based programs in a wider range of programming languages.

  • An outproxy makes it possible to reach other servers outside the I2P network via a server in the I2P network.
  • Such requests are forwarded to the outproxy, which then contacts the target and sends the response back.
  • Often, Outproxies do not route the requests directly to the server, but via the Tor network, which also allows you to reach Tor Hidden Services. Advanced outproxies offer additional features such as ad-blocking and caching (caching of page data) to increase speed.

There are no official outproxies on the I2P network. All outproxies are operated on a voluntary basis.

I2P has received a stable version every six to eight weeks. Updates are distributed via I2P torrents and signed by the release manager (usually zzz or str4d).

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to How Invisible Internet Project (I2P) Works

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Best WiFi Routers in 2020 for Spectrum Connection

    With a perfect router, we can experience a whole new world of internet. Our present title of the article is for Spectrum Internet connection as most web search with the brand name of the connection to bypass their limitation of technical knowledge. Spectrum provides cable internet service. The router setup for the cable internet connections […]

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy