The Invisible Internet Project
I2P Community Edition
This isn't the official I2P channel, if you want go there then you can find it in the links below.
Rules
- Be nice and friendly
- Don't spam
- No darknet markets
- No malicious content
- No closed source software
- No excessive self promotion
- No violence or hate speech
- I2P related posts only
- Please use English
- No illegal file sharing
- Lemmy rules also apply here
- No crypto-currency
"Don't be a dick" - Wil Wheaton
General
-
I2P Forum (clearnet) Official I2P community and development forum
-
zzz zzz's personal website, old developers forum
-
planet.i2p RSS aggregator
Media:
- Incogtube - Youtube front end
File Hosting and Pastebins
-
FS Filesharing service
-
Cake Pastebin short term filesharing and pastebin
-
PrivateBin Encrypted pastebin
-
IDK's CowYo pastebin, Mirror (Requires JS)
Torrents
-
PaTracker Main torrent tracker
-
Chudo's Torrents (French) torrent tracker
Social Networks and Microblogging
Exploring I2P
- Notbob List online .i2p sites and categorizes them
I2P Name Registries
-
reg.i2p operated by PurpleI2P Team
-
isitup.i2p Another I2P Name Registry and checking tools to see if a eepsite is offline.
Search engines
IRC
Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.
- Irc2P (works out of the box)
Syndie
An open source system for operating distributed forums in anonymous networks
-
Syndie Project Syndie Project Website
-
syndie.darrob.i2p
-
syndie.echelon.i2p
-
syndie.inscrutable.i2p
-
syndie.killyourtv.i2p
-
syndie.meeh.i2p
-
syndie.welterde.i2p
Inproxies
You can use inproxies to surf the I2P network without having to have an I2P router.
-
i2phides.me / i2p.mk16.de (i2p-inproxy.mk16.de)
-
onion.ly
Follow us on Twitter
view the rest of the comments
The trust model is totally different.
With a VPN you know the VPN dudes can compromise your security and you have to trust the specific guys hosting your VPN and also trust their OpSec. The failure mode is quite realistic.
With I2P, and Tor you can trust that anyone in the world can audit the code. Including the highly knowledgeable people who know this stuff.
The failure mode is very low and in reality depends on highly complex zero day vulnerabilities that can only be effectively exploited by a few nation-states, if they actually even have one.
That said, a VPN is lower hassle and probably good enough for most purposes.