Windows.  Viruses.  Notebooks.  Internet.  office.  Utilities.  Drivers

I2P(Invisible Internet Project) - decentralized anonymous network. Like TOR , only better, because it will not allow deanonization of the user even if some of the intermediate nodes are compromised. Decentralized means that the operation of I2P does not depend on any central nodes or "supernodes" (for example, there are no DNS servers or their equivalents).

How to use

First of all, you need to install the package i2p

sudo apt-add-repository ppa:i2p-maintainers/ i2p sudo apt-get update sudo apt-get install i2p

Then you need to launch the software router to connect to the I2P network. If you plan to use this network rarely, then you can start it with a command in the console (on behalf of your user, without sudo):

I2prouter start

If java service wrapper (http://wrapper.tanukisoftware.com/) is not used or does not work previous team, then the launch is done by the command (do not use sudo and do not run as root):

I2prouter-nowrapper

if access to the I2P network is required all the time, then you should probably run the I2P router as a daemon. To do this, run the command to reconfigure the i2p package in the console:

sudo dpkg-reconfigure -plow i2p

which will display a text interface in the console with the ability to select options, such as allowing the I2P router to run as a daemon at system startup, the memory limit for the I2P router, etc. After the reconfiguration is completed, the I2P router will be launched as a system daemon.

If the I2P router was launched on behalf of the user, then after a while the local address http://127.0.0.1:7657/home - "I2P router console" will open in the default browser.

Now let's explain to the system (including the browser) that you need to go to addresses like example.i2p through the localhost:4444 proxy. Create a new proxy.pac text editor, put in there:

function FindProxyForURL(url, host) ( if (dnsDomainIs(host, ".i2p" ) ) ( return "PROXY 127.0.0.1:4444" ; ) else ( return "DIRECT" ; ) )

We save. Open "System Settings" → "Network" → "Proxy Server", in "Auto Configuration URL" we specify the newly created file. All.

Attention! The method described above is not secure in terms of anonymity. Better highlight separate browser, and set only i2p in the proxy settings. And also disable access to regular web resources - clear the "List outproxy (x)" field on the page http://localhost:7657/i2ptunnel/edit.jsp?tunnel=0

It is worth remembering that due to the peculiarities of the network architecture, I2P does not immediately start working, you need to wait until your computer is more or less integrated into the network (several minutes or more).

i2prouter is controlled via a web interface.
http://localhost:7657/config - settings
http://localhost:7657/tunnels - tunnels

I2P on a dedicated server

This manual is relevant for home server located in one local network with the local computer. For VPS / VDS, you need to make adjustments to this manual

Installation is carried out in the same way as local computer. After installation, you need to make a tunnel from port 7657 to port 7657 of the server.

ssh user@ server -L7657:127.0.0.1:7657

If a server shell prompt appears in the console, the I2P Web interface will become available at localhost:7657

sudo nano /var/ lib/ i2p/ i2p-config/ clients.config

Find a similar line there

ClientApp.0.args=7657::1,127.0.0.1 ./webapps/

and make it look like this

ClientApp.0.args=7657 192.168.1.2 ./webapps/

Where 192.168.1.2 is the IP of your server. After you need to restart I2P, wait until it starts. If all settings are correct, the I2P web interface on the server will become available at http://server-ip:7657/ .

Proxy from any IP

File sharing

To date, the exchange of content of varying degrees of legality is the main application of I2P. There are a number of specialized programs for this, such as Robert and iMule (the I2P version of aMule).

Installing iMule

Install dependencies (I needed one):

sudo apt-get install libcrypto++9

Download the latest version of iMule and install it like this:

dpkg -i imule_2.3.2.0-precise-amd64.deb

We start, on the KAD tab in the "Initialization" - "From URL" Specify, for example, http://echelon.i2p/imule/nodes.dat , press Enter. We are waiting for the file to download. After that, do not forget to wait, and you can use it.

For some reason, my program does not connect to KAD every time, it helps to close it and start it again.

Troubleshooting

This section will describe possible problems with the launch and operation of iMule.

    When starting the program, nothing happens, if you run it through the terminal with the imule command, it displays next error:

imule: error while loading shared libraries: libbfd-2.22-system.so: cannot open shared object file: No such file or directory

Fixed by creating a symbolic link to an existing library in the system, but under a different name:

sudo ln -s / usr/ lib/ libbfd-2.22.90-system.20120924.so / usr/ lib/ libbfd-2.22 -system.so

Every Internet user, when browsing the web, leaves behind a lot more "footprints" than he thinks. Sometimes their data is collected for statistics or accounting, and sometimes it can get to intruders. But progress does not stand still. The development team created and launched the i2p project, which is a kind of antidote for curious sites and people. Now it remains to consider the question of how to use i2p.

So, i2p stands for Invisible Internet Project and translates as "Invisible Internet Project". With it, you can create an encrypted network and remain anonymous when performing any actions on the Internet. The principle of operation is as follows: the user runs a program on his computer that works as a proxy server. All traffic is sent in advance to this proxy. We can say that i2p is a kind of intermediary between the computer and the end point of information delivery. At the same time, traffic entering this intermediary is encrypted by the gateway. So, already encrypted, secure traffic arrives at the endpoint.

It is worth noting that all information sent as a packet, when using such a proxy server, is divided into several packets and sent through random channels that change every minute. And the IP address itself will be replaced with a random one cryptographic key. That is why it becomes almost impossible to establish which computer was the sender.

Should i2p be used?

Such a project may be of interest to those for whom the following is important:

  • the inability to establish the IP address from which certain information was sent;
  • inability to track actions;
  • lack of DNS servers;
  • division of outgoing traffic into packets and sending in parts;
  • encryption of outgoing traffic;
  • lack of censorship;
  • possibility of using anonymous e-mail;
  • the ability to visit anonymous sites;
  • the ability to anonymously transfer data, for example, torrent files;
  • opportunity anonymous use instant messaging services (IRC and Jabber or alternative service);
  • the ability to visit sites that have not passed censorship.

What services are built into this program?

  • Mail - classic mail with many settings and the ability to use any mail client;
  • Bote - analogue of mail;
  • IRC - chat;
  • Jabber - chat;
  • Messenger - "branded" chat;
  • Speedtest - an analogue of the well-known speed meter;
  • Rapidshare - file hosting;
  • privacybox;
  • Radio is actually radio.

Users of what operating systems can install "invisible Internet"?

IN this moment such a proxy server is compatible with most popular operating systems, and can also work even with weak PCs, since it is not a resource-intensive application. So, owners can install it:

  • windows;
  • MacOS X;
  • BSD, Linux, GNU, Solaris;
  • Ubuntu, Debian
  • Android.

i2p setup

In general, to work on the anonymous Internet, you need:

  • download and install the i2p program;
  • configure the browser to work with the program through a proxy;
  • run the installed program;
  • launch the rebuilt browser.

To get started, download the -i2p program itself, you can download it on the site of this. Choose the right setup file, depending on our operating system and download it to your computer. The figure shows an example of using Windows.

After the program has been downloaded, you need to check Java version Runtime - it must be at least 1.5. But you can not bother with the check - the program itself will tell everything. Let's watch and do it.

We launch the installer. Let's start the installation. Click the "launch" button.

Click OK. We are being redirected to download Java.

Hit the big red download button. A window pops up.

We agree to the terms - just press the button and download the installation file of the toad, i.e. (God forgive me) Java. we launch it I won't tell you in detail how to install such a product, because everything is quite simple. Who did not cope, you can write in the comments.

Let's consider an example of work in the browser.

You need to go to the browser settings, select the network / proxy settings there and set the HTTP proxy server by entering the IP address 127.0.0.1 and port 4444.

Consider this action in detail (with pictures).

In the upper left corner of the browser, click Firefox, then "Settings", in the opened context menu click "Settings"

On the "Network" tab, click the "Configure ..." button.

Then click the radio button manual setting proxy server. We write in the appropriate fields the IP address 127.0.0.1 and port 4444.

And click OK.

The next step is to install a proxy server on your computer.

We launch the downloaded router program. A window pops up.

Click OK. And we continue with the setup.

Click "Completed".

After installing the program, run it. The muzzle will open to us, i.e. router console.

You can do nothing in this console. We just check that our installation is going as it should.

Now we look, if the green dot “Collective channels” lights up in the panel on the left, then the setting is completed. But what to do next, as will be discussed in the next article.

I2p is a program that is easy to install and does not require specific knowledge to use. It allows you to remain anonymous online, which significantly increases security and personal comfort. It is impossible not to mention that the program will work even if the number of users is two. Well, as the development of the program and service continues, you can expect a lot of new and nice features.

Your web browser will need to be configured in order to browse web sites on I2P and to utilize the outproxies available within I2P. Below are walkthroughs for some of the most popular browsers.

Firefox Profile for Windows

If you are using Windows, the recommended way of accessing I2P is using the Firefox profile .

If you do not wish to use that profile or are not on Windows, you need to configure your browser yourself. Read below on how to.

How to set up your browser

Firefox

Instructions for Firefox 57 below:

Select Menu button in the upper right corner Settings. Scroll down until you see the section network proxy as shown in the screenshot below. Press Settings

In a popup window Connection options select Setting up a proxy server manually. Set HTTP and SSL proxy for address 127.0.0.1 with port 4444 as shown in the following screenshot.


Finally, go to the address about:config and find the property media.peerConnection.ice.proxy_only. Ensure that this setting is True.


Chrome

Chromium-Based Browsers like Chrome have slightly different places for their proxy settings depending on variant and platform. These instructions may be slightly different in Brave or Iridium, for instance. From the Main menu, navigate to the Settings, and search for the menu item. Clicking it will open the right settings for your platform.


On Windows, this button will launch you into the shared proxy settings used by , and you can configure it by following the Internet Explorer 8 guide.

Internet Explorer

In the start menu search for the "Network and Internet Settings" to open the settings. The last entry in the menu is the Proxy Settings, click it to your proxy to connect to I2P.


Now set the checkmark at "use a proxy server for your LAN" and at the "Bypass proxy server for local addresses". With a click on Advanced-button you open the window to open the ports. Enter the values ​​like on the picture, IP 127.0.0.1 and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the settings and your browser is set to use the I2P proxy.


Terms of use of an external proxy

Remember: I2P was not designed to be a proxy to the outside Internet. Instead, I2P is meant to be used as an internal network.

The I2P project itself does not run any proxies to the Internet. The only outproxy is a service from the privacy solutions project. Consider donating to them for a continued stable service. Increased funding will allow them to improve this service.

http://privacysolutions.no

By default, I2P comes with two outproxies configured: false.i2p and outproxy-tor.meeh.i2p . Even the domain names are different, it "s the same outproxy you hit. (multi-homed/keyed for better performance)

Filtering is configured on these external proxies (for example, mibbit and torrent trackers are blocked). Sites accessed by .i2p addresses are also not allowed through external proxies. For convenience, external proxies block ad servers.

Tor is a good application to use as an outproxy to the Internet.

I2P– An anonymous network created in 2003 by German developers. Unlike and not spammed by sites with dp. There is a more adequate audience, but it seems to be temporary. It was created with the goal of complete anonymity, and they succeeded. All traffic goes through "tunnels" through the same network participants. The network does not have name servers (DNS), all information about sites is stored in address books that are updated like a torrent network. It makes no sense to tell why you need this network, if you need to go there, you know why. At the end of the article you will find a video that tells how to connect to the i2p network.


I2P sites

Everything went according to plan and now you can open and use sites i2p I will describe some of them:

  • http://forum.i2p/ - forum i2p with Russian section
  • http://hiddenchan.i2p/ - Hidenchan. Russian-language imageboard
  • http://rus.i2p/ - Russian i2p WIKI - mainly describes the features and the i2p network, there is a list of Russian-language sites.

Problems and bugs

Main problems and their solutions. If you have any questions, you can use

I2p is an anonymous network for invisible Internet access. Most often it is used to protect the transmission of data. The use of I2p is possible on conventional computers and on Android devices. To access the Internet invisible, you need to install special program to your computer. The program is distributed free of charge and is available on the official website of the developer.

At its core, an I2p network is not direct access to the Internet. All requests go through the so-called "tunnels", which provide anonymity and data protection.
In this article, we will analyze in detail how to download and install the I2p program on your computer, what settings you need to make in order to be able to visit sites anonymously.

  1. To download, go to the official website geti2p.net.
  2. On home page you will see a big green button "Download I2P version 0.9.33", click on it.
  3. The next step is to download the version of the program for your computer. Currently I2p can be installed on Windows, MAC, Linux, Debian and Android.
    Choose the appropriate version, for example, for Windows. Download the file by clicking on it.
  4. The corresponding file will be downloaded to your computer. this example we'll look at installing I2p for Windows. The file size is 17.6 MB.
  5. Wait for it to finish downloading and go to the "Downloads" section on your computer. Find the downloaded file there and double-click on it to start the installation.
  6. The program will ask you to select a language, the default is Russian. Click OK.
  7. A welcome message will appear, click Next.
  8. The program will prompt you to read the rules, click "Next".
  9. The next step is to select the kits to install. Check the boxes as shown in the picture below and click "Next".
  10. Select the installation directory - by default, the program will offer to install the installation on drive C, click "Next".
  11. Confirm the creation of the installation directory by clicking OK.
  12. Now you need to configure the creation of shortcuts. Here you can leave everything as default. If you wish, you can create an additional shortcut on the desktop by checking the appropriate checkbox, click "Next".
  13. The program will start the installation, the whole process takes just a few seconds. After 2 blue fully filled bars appear, click "Next".
  14. I2p installation is complete, to close the window, click on the "Completed" button.
  15. To open the program, go to the "Start" section and click "Start I2P".
  16. In just a few seconds, Internet Explorer will open on your computer with the router console.

I2p setup

You will see the basic recommendations for configuring the router immediately after opening the program in Internet Explorer. They are located in the topmost window. Here is a small instruction, as well as links to the "FAQ" section on the official website of the developer.
First you need to go to network settings and set a speed limit that matches your internet connection.


How to fix mistakes

Here you should pay attention to the following parameter - in the "Network" column, the "OK" icon should appear. This means that all settings are correct and the router is ready to go.

If any error is displayed in the "Network" column, then it must be corrected. Very often the error "Blocked by firewall" occurs. In this case, you need to go to the network settings in the “Network” section and check if you have a checkmark next to the item “Use UPnP to automatically open ports on the firewall”. If this checkbox is checked, but the error does not disappear, then you need to go to the router settings and make the necessary changes there.

To do this, go to the settings of the router that you use to connect to the Internet. Find the item "Configuring UPnP" in it. Here you need to enable UPnP and save the changes.

After making changes to the router, go ahead and update the I2p console. The error should disappear. Opposite the "Network" item, the inscription "OK" should appear.

I2p library

The entire anonymous I2p network is completely decentralized and does not have a single database. When installing the program, each user must independently download and update their address book. Initially, there will be only about 400 sites on the I2p network, so new libraries need to be added to it. To do this, go to the "Subscriptions" section.

In the column "Subscriptions" you need to insert additional libraries and click on the "Save" button. The developers of the I2p network themselves provide 3 libraries by default. However, on various forums and sites on the Internet, you can find a much larger number of different libraries.

How to increase speed and traffic

To do this, go to the "Traffic" section, to the "Speed ​​​​limit" item. By default it will be set to 40 kilobytes per second, you need to change these numbers by simply adding 0 at the end. When using the I2p network, you should always remember that your computer, after connecting, will also participate in transmitting traffic to other users. Even when you do not use the network and do not open sites on the Internet. After connecting to I2p, your computer will also be a chain in the distribution and transmission of traffic.

To regulate the data transfer rate, you can change the figure in the column "Share of transit traffic". The higher the proportion set, the higher the data rate will be.

Tunnel Length Adjustment

To regulate tunnels, go to the "tunnels" section. A special panel will open in which you can set the length of incoming and outgoing tunnels. Here you can set different values ​​for the length of the tunnels, depending on your goals. On average, 2 tunnels are enough to ensure anonymity and good site opening speed.
It should be remembered that the longer the tunnel, the higher the anonymity and the slower the sites will open. If you want to get more anonymity, then you need to increase the length of the tunnel. If it is important for you that the site opens quickly, then set the tunnel to medium or small.

If you notice an error, select a piece of text and press Ctrl + Enter
SHARE: