What is i2p browser ?
- Aamir khan (Cyber Security Analyst)
- Mar 26, 2018
- 3 min read
The Invisible Internet Project (I2P) I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys).
How does it work?
To anonymize the messages sent, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively). In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client's inbound tunnels, eventually reaching the destination. Every participant in the network chooses the length of these tunnels, and in doing so, makes a trade off between anonymity, latency, and throughput according to their own needs. The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender's and the receiver's threat model.
The first time a client wants to contact another client, they make a query against the fully distributed "network database" - a custom structured distributed hash table (DHT) based off the Kademlia algorithm. This is done to find the other client's inbound tunnels efficiently, but subsequent messages between them usually includes that data so no further network database lookup are required.
More details about how I2P works are available.
Dependency
Java Run time Version 7 or higher. (Oracle, OpenJDK, or IcedTea Java Version 7 or 8 recommended, except Raspberry Pi: Oracle JDK 8 for ARM, PowerPC: IBM Java SE 7 or 8) Determine your installed Java version here or type java -version at your command prompt. Java 9
support is in development and it is not recommended for general use.
Download Link : https://geti2p.net/en/download
What can you do with I2P?
Email: Integrated web mail interface, plugin for server less email. Web browsing: Anonymous websites, gateways to and from the public Internet. Blogging and forums: Blogging and Syndie plugins. Website hosting: Integrated anonymous web server. Real-time chat: Instant messaging and IRC clients. File sharing: ED2K and Gnutella clients, integrated BitTorrent client. Decentralized file storage: Tahoe-LAFS distributed file system plugin.
How to configure your browser
Internet Explorer 8
Firefox
Chrome
Out-proxy Terms Of Service
Internet Explorer 8 or Chrome
In the tools menu select the "Internet Options" line to open the settings. In the settings window choose the connections tab and click on LAN settings for the proxy port configuration.

Now set the check mark at "use a proxy server for your LAN" and at the "Bypass proxy server for local addresses". With a click on Advanced-button you open the window to open the ports. Enter the values like on the picture, IP 127.0.0.1 and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the settings and your browser is set to use the I2P proxy. Note/Privacy tip: Set the FTP proxy to the same settings as the HTTP proxy.

Firefox
From the Tools menu, select Options to bring up the Firefox settings panel. Click the icon labelled Advanced, then click on the Network tab. In the Connections section, click on the Settings button. You'll see a Window like the following:

In the Connection Settings window, click the circle next to Manual proxy configuration, then enter 127.0.0.1, port 4444 in the HTTP Proxy field. Enter 127.0.0.1, port 4445 in the SSL Proxy field. Be sure to enter localhost and 127.0.0.1 into the "No Proxy for" box. Note/Privacy tip: Set the FTP proxy to the same settings as the HTTP proxy.

Out proxy Terms Of Service
Remember: I2P was not designed for creating proxies to the outer Internet. Instead, it is meant to be used as an internal network.
The I2P project itself does not run any proxies to the Internet. The only out proxy is a service from the privacy solutions project. Consider donating to them for a continued stable service. Higher bandwidth will increase with the founding of the organization. Maybe more out proxies too.
Tor is good application to use as an outproxy to the Internet.
Comments