this post was submitted on 18 Aug 2025
38 points (89.6% liked)

The Invisible Internet Project

1787 readers
5 users here now

I2P Community Edition

This isn't the official I2P channel, if you want go there then you can find it in the links below.

Rules

"Don't be a dick" - Wil Wheaton

General

Media:

File Hosting and Pastebins

Torrents

Social Networks and Microblogging

Exploring I2P

I2P Name Registries

Search engines

IRC

Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.

Syndie

An open source system for operating distributed forums in anonymous networks

Inproxies

You can use inproxies to surf the I2P network without having to have an I2P router.

Follow us on Twitter

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] degen@midwest.social 4 points 4 weeks ago (3 children)

I haven't looked at the article yet and only superficially poked around with I2P, but I think the idea is that user adoption is the key to better speeds and reliability given the P2P nature. That said, I found it to be daunting as well just getting into it.

Privacy and security in general are like that for me because a lot of the pitfalls come with how you use the tech and not just the structures they provide.

[–] shortwavesurfer@lemmy.zip 1 points 4 weeks ago

Yep, this is the same thing that happened last time. I got my Monero wallet up and running over an I2P node again, and I can barely get 100 Kb/s. It will jump to a max of 1Mb/s rarely and then drop right back down again. On tor i get more like 400Kb/s average instead of barely 100.

[–] undefined@lemmy.hogru.ch 1 points 4 weeks ago* (last edited 4 weeks ago) (2 children)

I think the idea is that user adoption is the key to better speeds and reliability given the P2P nature

~~That is correct. i2p is designed such that peers are expected (required?) to share some bandwidth to be on the network.~~

Of course, that bandwidth stays in-network (unlike Tor which supports “exit nodes”) so it is less risky to share.

Edit: I’m totally wrong, oops

[–] WhyJiffie@sh.itjust.works 1 points 4 weeks ago

It's not required but default on. there's a setting for it, but also if it detects from your IP that you are in a risky country, it'll not enable the functionality to bridge other traffic

[–] sobchak@programming.dev 1 points 4 weeks ago (1 children)

I think 300KB/s is around the max possible in the current implementation:

Encryption, latency, and how a tunnel is built makes it quite expensive in CPU time to build a tunnel. This is why a destination is only allowed to have a maximum of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available). Used tunnels are discarded every 10 minutes and new ones are built. This change of tunnels, and sometimes clients that shutdown or lose their connection to the network will sometimes break tunnels and connections. An example of this can be seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget.

https://geti2p.net/en/about/performance

[–] CAVOK@lemmy.world 2 points 3 weeks ago

I've seen speeds in the Mb/s range, although rarely.