Ultimate Guide to I2p – How it differs from Tor/VPN + Setup Guide
If you have an interest in online privacy and security, then you might already have an understanding of the Dark Web and Tor, but that is just a tip of the iceberg.
There are other networks that offer more anonymity, and currently one of the most proficient is I2P; though it is yet to grow to the popularity of Tor.
The following guide addresses everything you need to know about I2P and explains how to start using the network.
Table of Content:
- 1 What is I2P?
- 2 How I2P Works
- 3 Garlic Routings vs. Onion Routing
- 4 How is I2P Different from Tor?
- 5 Does I2P do the same as a VPN?
- 6 How to set up the I2P Network
- 7 Configuring your I2p Network
- 8 How to Use I2P
- 9 Final Word
What is I2P?
The Invisible Internet Project is a network that focuses on anonymizing users and providing secure internal connections between them. I2P operates online but is obscured from view unless dedicated software is used.
I2P differs from Tor as, while the latter allows you to browse the Dark Web and the internet anonymously, I2P was developed as self-contained software for the darknet, with a completely different architecture.
How I2P Works
The I2P network can only be accessed using specific software and is written in Java. The network relies on P2P participation to work, creating connections between users, referred to as tunnels, the complexity of which helping to facilitate anonymity. Every device in the network acts as a router, and so I2P is a decentralized network.
What this means is that it’s difficult, or impossible, for any third-party to observe the complete circuit to determine either the source or the destination; which is referred to as Garlic Routing.
Garlic Routings vs. Onion Routing
Tor network encrypts data in layers, with all data encoded in as many layers as nodes it passes through. It’s easier to grasp if you imagine a five-part circuit; the client, the Guard Node, the Middle Node, the Exit Node, and the destination.
Each exchange adds a layer of encryption except between the exit node and destination when it is unencrypted. In actuality, there can be hundreds of nodes, and therefore layers of encryption, and the destination can only ever discern the exit node.
However, it’s easy for organizations, like the NSA, to set up honeypot exit nodes to monitor traffic. A technique that measures the time taken for any computer operation to be executed in order to trace a source, known as end-end timing attacks, reveals the susceptibility of Tor.
As I2P, along with others like Freenet, has been developed specifically for purpose as a darknet, it offers more anonymity than Tor, with a method of routing that ensures maximum anonymity.
Rather than encrypt a single data packet, Garlic Routing involves grouping and encrypting multiple packets simultaneously. Each of the packets is usually independent and does not affect the state of others, with singular delivery instructions, and it breaks off upon reaching the correct destination. Tracking a single packet is more difficult than tracking a single computer in a network.
How is I2P Different from Tor?
The software differs entirely in how they operate, as well as what they offer.
Does I2P do the same as a VPN?
I2P and a VPN share some similarities, but both are different and can be used together for maximum privacy and security.
How a VPN Works
Unlike I2P and Tor, the level of privacy with a VPN depends on the service provider. To achieve maximum privacy, you need to use a premium VPN service with sophisticated protocols, adheres to a zero logs policy, and is based somewhere outside of government jurisdiction.
If based in a country like the US, the law requires some user or connectivity logs.
I2P vs. VPN
While I2P offers anonymous access to the dark web, a VPN focuses on providing security and privacy on the internet.
Combining I2P or Tor with a VPN can ensure maximum security and absolute anonymity, though it will have a considerable impact on connection speeds.
Nevertheless, solely using a reliable VPN like ExpressVPN can still be sufficient for security, and providing other benefits.
- Obscuring online activity
- Securing public hotspots
- Circumventing geo-restrictions
- Streaming on Netflix, Hulu, BBC iPlayer, Spotify, etc.
- Safer P2P and torrenting
- Evading censorship in countries like Iran and China
- Avoiding bandwidth throttling
How to set up the I2P Network
The first thing you have to do is install Java if you haven’t already. The software can be downloaded from the official Java website.
Next, you need to download and install the I2P software, which is available for the following platforms.
- Mac OS X
- GNU/ Linus/ BSD/ Solaris
- Debian/ Ubuntu
Significantly, there is no current iOS-compatible version of I2P.
This tutorial is focused on Windows 10, which is the most popular desktop operating system.
Configuring your I2p Network
We recommend Mozilla Firefox in conjunction with I2P, as it is more secure than Internet Explorer, and more private than Google Chrome, due to their extensive prying.
How to Use I2P
If you’re new to the technology, you won’t be aware of all of the benefits of the network. Below are some of the primary services you can use with I2P.
1Email / Messaging
I2P has a mail service known as I2P Bote, which is a fully decentralized and distributed anonymous email system which keeps you secure and anonymous. All email is encrypted, and no one will be able to intercept them.
Susimail is an available web-based email service, run and hosted by an individual known as Postman. It’s an excellent service for privacy and security.
The name given to sites on the I2P network, and they usually have the .i2p suffix. These sites can only be accessed within I2P, and so they make up the I2P darknet.
Some specific eepsites can only be accessed when the owner is online, which is the main drawback of a distributed network.
I2P offers the capacity to torrent safely, and they highly encourage it, and you can access I2P’s inbuilt Torrent client, called I2PSnark, from the router console.
You can install an I2P add-on on Vuze to facilitate anonymous torrenting over the internet.
4IRC (Internet Relay Chart)
Once familiar with I2P, you can also try accessing IRC, which has I2P chat rooms. You will, however, require to have a client already installed on your system, and you can check out its documentation here.
I2P offers you connectivity to a whole new level of the internet that is hidden to regular internet users. Just like its name suggests (Invisible Internet Project), it’s aim is to offer users privacy and security, especially at this day and age when ISPs, governments, and other organizations, are monitoring how people use the internet.