2017-01-25 19:20:49 +00:00
## What is I2P?
2017-01-26 14:37:51 +00:00
I2P (Invisible Internet Protocol) is a universal anonymous network layer.
2018-06-01 10:40:45 +00:00
All communications over I2P are anonymous and end-to-end encrypted, participants
don't reveal their real IP addresses.
2017-01-26 14:37:51 +00:00
2018-06-01 10:40:45 +00:00
I2P client is a software used for building and using anonymous I2P
networks. Such networks are commonly used for anonymous peer-to-peer
applications (filesharing, cryptocurrencies) and anonymous client-server
applications (websites, instant messengers, chat-servers).
2017-01-25 19:20:49 +00:00
2017-01-26 14:37:51 +00:00
I2P allows people from all around the world to communicate and share information
without restrictions.
2018-05-21 03:26:33 +00:00
A deeper technical introduction of I2P can be found [here ](https://geti2p.net/en/docs/how/tech-intro ).
2017-01-25 19:20:49 +00:00
## How i2pd differs from original I2P implementation?
2018-05-21 03:26:33 +00:00
While [Java I2P ](https://geti2p.net ) and i2pd are both clients for the I2P network, i2pd has some big differences and advantages:
2017-01-26 14:37:51 +00:00
* Java I2P has built-in applications for torrents, e-mail and so on. i2pd is just a router which you can use with other software through I2CP interface.
* i2pd does not require Java. It's written in C++.
* i2pd consumes less memory and CPU.
* i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers).
* i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy.
2018-06-01 10:40:45 +00:00
## Why is the I2P network so slow and unstable sometimes?
2017-01-25 19:20:49 +00:00
2018-06-01 10:40:45 +00:00
By design, in the I2P network, your connection gets encrypted through a chain of 6
2017-01-26 14:37:51 +00:00
random computers in the way to it's final destination. If one of those computers
2018-05-21 03:26:33 +00:00
is shut down, or experiences connectivity problems, it can take some time for your
2017-01-26 14:37:51 +00:00
I2P router to discover and fix that issue.
2017-01-25 19:20:49 +00:00
2018-05-21 03:26:33 +00:00
## Help! i2pd is not working. What do I do?
2017-01-25 19:20:49 +00:00
2017-01-26 14:37:51 +00:00
First of all, synchronize system clock on your machine with Internet.
2017-01-25 19:20:49 +00:00
2017-01-26 14:37:51 +00:00
If that does not help, on Linux machines, check the number of open file descriptors
2018-05-21 03:26:33 +00:00
allowed to a process. In a terminal, run:
2017-01-26 14:37:51 +00:00
ulimit -n
Correct value for regular i2pd node is 4096, for a floodfill it is 8192.
2018-05-21 03:26:33 +00:00
Set it before you run i2pd like so:
2017-01-26 14:37:51 +00:00
ulimit -n 4096 & & ./i2pd
If that doesn't help, then you may have found a bug.
Contact developers with IRC or create an issue on GitHub.
## What is good tunnel creation success rate value?
Average values are 15% - 40%. Larger is better.
2017-01-25 19:20:49 +00:00
2018-06-01 10:40:45 +00:00
## Is there a place I can use to find running I2P websites?
2017-01-25 19:20:49 +00:00
2018-05-21 03:26:33 +00:00
Sure, there is a list [here ](http://identiguy.i2p.xyz/ )
2017-01-25 19:20:49 +00:00
## How can I better integrate my router to the network?
Edit your settings: set correct bandwidth and share rate.
Run i2pd for a long time, download and seed some popular torrents.
## What browser should I use to browse I2P websites?
2018-05-21 03:26:33 +00:00
Use any open source browser - for example, Firefox or a Chromium based alternative. Create separate profile for I2P ([firefox instructions](https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles)),
and try not to mix clearnet browsing with I2P. Learn how to configure your browser for better privacy and security.
2017-01-25 19:20:49 +00:00
2018-05-21 03:26:33 +00:00
Configuring [privoxy ](https://wiki.archlinux.org/index.php/Privoxy ) for I2P/onion/clearnet browsing at the same time is a good idea.
2017-01-25 19:20:49 +00:00
2018-05-21 03:26:33 +00:00
i2pd's socks proxy has an option to pass all non-I2P traffic to the Tor socks proxy. Make sure you know what are you doing when using this!
2017-01-25 19:20:49 +00:00
2017-01-26 14:37:51 +00:00
## What is a floodfill mode?
2018-05-21 03:26:33 +00:00
Floodfill mode is a special mode, which contributes to the I2P network more.
2017-01-26 14:37:51 +00:00
You may want to enable floodfill mode if you have stable uptime and high bandwidth
to share.
## How is I2P different from Tor?
2018-05-21 03:26:33 +00:00
I2P and Tor have some similarities, but they are completely different technologies.
2017-01-26 14:37:51 +00:00
2018-06-01 10:40:45 +00:00
Tor is designed to act as an anonymous proxy for the regular Internet, and I2P
is specifically designed to make a virtual anonymous network for hidden services
and p2p applications.
2017-01-26 14:37:51 +00:00
2018-05-21 03:26:33 +00:00
Tor Project was started by the US military and receives most of its funds
from the government, while I2P was started by a community of independent civilians.
2017-01-26 14:37:51 +00:00
2018-06-01 10:40:45 +00:00
Tor is highly centralized by design, while I2P is designed to be decentralized and distributed.
2017-01-26 14:37:51 +00:00
## Can use i2pd as a proxy for regular Internet?
Not out of the box. You better use [Tor ](https://www.torproject.org/ ) for that.