view the rest of the comments
The Invisible Internet Project
I2P Community Edition
This isn't the official I2P channel, if you want go there then you can find it in the links below.
Rules
- Be nice and friendly
- Don't spam
- No darknet markets
- No malicious content
- No closed source software
- No excessive self promotion
- No violence or hate speech
- I2P related posts only
- Please use English
- No illegal file sharing
- Lemmy rules also apply here
- No crypto-currency
"Don't be a dick" - Wil Wheaton
General
-
I2P Forum (clearnet) Official I2P community and development forum
-
zzz zzz's personal website, old developers forum
-
planet.i2p RSS aggregator
Media:
- Incogtube - Youtube front end
File Hosting and Pastebins
-
FS Filesharing service
-
Cake Pastebin short term filesharing and pastebin
-
PrivateBin Encrypted pastebin
-
IDK's CowYo pastebin, Mirror (Requires JS)
Torrents
-
PaTracker Main torrent tracker
-
Chudo's Torrents (French) torrent tracker
Social Networks and Microblogging
Exploring I2P
- Notbob List online .i2p sites and categorizes them
I2P Name Registries
-
reg.i2p operated by PurpleI2P Team
-
isitup.i2p Another I2P Name Registry and checking tools to see if a eepsite is offline.
Search engines
IRC
Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.
- Irc2P (works out of the box)
Syndie
An open source system for operating distributed forums in anonymous networks
-
Syndie Project Syndie Project Website
-
syndie.darrob.i2p
-
syndie.echelon.i2p
-
syndie.inscrutable.i2p
-
syndie.killyourtv.i2p
-
syndie.meeh.i2p
-
syndie.welterde.i2p
Inproxies
You can use inproxies to surf the I2P network without having to have an I2P router.
-
i2phides.me / i2p.mk16.de (i2p-inproxy.mk16.de)
-
onion.ly
Follow us on Twitter
Thanks for the info. Why are we suppost to turn off protections?
From one of the developers:
Excellent question. In the case of Java I2P and of I2P+, the attacker is actually gaming the sybil attack tool in order to trick routers into erroneously banning floodfills.
Basically the attacker has found a way to trick real routers into attempting to connect to fake routers. Normally, this is not harmful, fake routers are just offline routers. Offline forever.
But if you craft your fake router this one specific way then the router you are tricking thinks some real router, which is usually reachable, is offline. That's how it affects I2P without the sybil tool. The sybil tool, in this case, amplifies the effect of the attack and the duration of the attack, because the real router which is ddos'ed gets banned by the sybil tool.
Edit: I am deliberately leaving out specific details here.
It looks like the ddos is exploiting this functionality
Of course it is