What is I2P?
The Invisible Internet Project is an anonymous network layer designed for internal services (eepsites) rather than accessing the regular internet. I2P uses garlic routing to provide strong anonymity for both users and services.
Also known as: Invisible Internet Project, Eepsite
I2P creates an internet within the internet—a fully encrypted network where both users and services are anonymous. Unlike Tor, which focuses on accessing the regular web anonymously, I2P is designed for its own internal ecosystem.
I2P vs Tor
| Aspect | I2P | Tor |
|---|---|---|
| Primary use | Internal network | Anonymous browsing |
| Routing | Garlic (bundled) | Onion (layered) |
| Network model | Peer-to-peer | Client-server |
| Hidden services | Primary focus | Secondary feature |
| Outproxies | Limited | Many exit nodes |
Garlic Routing
I2P bundles multiple messages together (like cloves in a garlic):
- Multiple messages encrypted together
- Harder to analyze than single onion layers
- More efficient use of bandwidth
I2P Features
Eepsites
- Websites hosted within I2P
- .i2p addresses
- Anonymous hosting
I2P Applications
- I2P-Bote: Anonymous email
- I2PSnark: BitTorrent client
- SusiMail: Webmail interface
Network Architecture
- All users are relays by default
- No central directory (distributed)
- Self-organizing network
Use Cases
Anonymous Publishing
- Host content without revealing identity
- Resistant to takedowns
- Strong whistleblower protection
Secure Communication
- Email, messaging, forums
- Both parties protected
- No metadata leakage
File Sharing
- Anonymous BitTorrent
- Distributed storage
- Censorship resistance
Getting Started
- Download I2P router software
- Run router (becomes network node)
- Wait for tunnel building (10-15 minutes)
- Access .i2p sites through I2P proxy
Limitations
- Slower than regular internet
- Smaller network than Tor
- Learning curve for new users
- Limited outproxy support
Related Terms
Anonymity
The state of being unidentifiable or untraceable. In privacy contexts, anonymity means your actions cannot be linked back to your real identity—no one can connect your online activity to who you are.
Tor
The Onion Router—a free network that routes your traffic through multiple layers of encrypted relays. No single relay knows both your identity and your destination. Tor enables anonymous browsing, access to .onion sites, and censorship circumvention.
Virtual Private Network
A technology that creates a secure, encrypted connection over a less secure network, such as the public internet. VPNs mask your IP address, encrypt your internet traffic, and can make it appear as though you're browsing from a different location.