I2P 0.9.2

I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.

I2P comes across as a web-based approach to communication security, allowing users to chat in an environment that is protected by several dedicated layers.

The whole architecture is provided by a distributed network whose main purpose is to ensure anonymity and privacy while communicating over the Internet.

The project started off a long time ago, back in 2003, and is continuously maintained and updated so as to be able to counterattack the latest tracking and hacking strategies that emerge in the software world.

Next to Tor or Freenet, I2P joins the battle against such attempts through a complex algorithm that involves a series of nodes or routers, with the traffic being routed to a number of peers and the messages sent through secure tunnels.

Compared to its competitors, I2P has the advantage of having been optimized to work with hidden services, completed by the presence of short lived tunnels which sport a lower risk of attack than inside a circuit based network such as Tor.

However, the list of pros and cons if a thorough comparison would take place is balanced and the choice is totally up to the user, therefore there’s no point in discussing it extensively.

The general idea with I2P is that it can be configured to work both in the browser and in chat applications, which is an obvious upside. Nevertheless, it assumes that you have a dose of previous networking knowledge in order to make advanced configurations.

The so-called eepsites are webpages hosted completely anonymously that can be accessed by configuring the HTTP proxy of your browser to make use of the web proxy. IRC clients can be set to redirect traffic to a port on the localhost that is managed by I2P, thus ensuring a high level of privacy during chat sessions.

Overall, I2P is an excellent choice if you want to boost the security of your communications. If there’s a disadvantage to it, it’s the low level of usability which restricts its audience to advanced users only.

Platform: Windows XP/Vista/7/8/8.1/10
License: Freeware
Author: Website
Size: 14.2MB

SHA256: 40a9d162b218c3280170b5e6e5e0f459a2c5348c9488222955be5312144eade9

Direct Link 2Shared:
Download Now

Direct Link Solidfiles:
Download Now

Direct Link 4Shared:
Download Now

Direct Link Mega:
Download Now

Direct Link Mediafire:
Download Now

Direct Link Hostr:
Download Now

Publisher's Website:
Download Now