this post was submitted on 18 Aug 2025
38 points (89.6% liked)

The Invisible Internet Project

1787 readers
5 users here now

I2P Community Edition

This isn't the official I2P channel, if you want go there then you can find it in the links below.

Rules

"Don't be a dick" - Wil Wheaton

General

Media:

File Hosting and Pastebins

Torrents

Social Networks and Microblogging

Exploring I2P

I2P Name Registries

Search engines

IRC

Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.

Syndie

An open source system for operating distributed forums in anonymous networks

Inproxies

You can use inproxies to surf the I2P network without having to have an I2P router.

Follow us on Twitter

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] silverpill@mitra.social 21 points 4 weeks ago (2 children)

I think this article is generated by AI.
Fake CVE numbers. For example, "critical vulnerability (CVE-2021-34527) revealed that Tor Browser leaked real IPs under certain configurations", but if you look it up, it is about Windows Print Spooler.
I2P sites also look fake.
The debian package is called i2pd, not purplei2p

[–] CAVOK@lemmy.world 3 points 4 weeks ago

Could be. I didn't write it, just passed it on.

[–] xwyqi@mitra.xwyqi.org 3 points 4 weeks ago (1 children)

@silverpill >Developers in China use it to distribute tools and circumvent the Great Firewall.

Tbh, Chinese developers typically use shadowsocks or vmess protocol proxies; they do not use i2p. Futhermore, no one in China knows about i2p, even though its usability is better than Tor.

[–] otter@lemmy.dbzer0.com 2 points 4 weeks ago

"No one"? Hrm. Press X.