I2P allows people from all around the world to communicate and share information
I2P allows people from all around the world to communicate and share information
without restrictions.
without restrictions.
Deeper technical introduction of I2P can be found [here](https://geti2p.net/en/docs/how/tech-intro).
A deeper technical introduction of I2P can be found [here](https://geti2p.net/en/docs/how/tech-intro).
## How i2pd differs from original I2P implementation?
## How i2pd differs from original I2P implementation?
While [Java I2P](https://geti2p.net) is being original client for I2P network, i2pd has some big differences and advantages:
While [Java I2P](https://geti2p.net) and i2pd are both clients for the I2P network, i2pd has some big differences and advantages:
* Java I2P has built-in applications for torrents, e-mail and so on. i2pd is just a router which you can use with other software through I2CP interface.
* Java I2P has built-in applications for torrents, e-mail and so on. i2pd is just a router which you can use with other software through I2CP interface.
* i2pd does not require Java. It's written in C++.
* i2pd does not require Java. It's written in C++.
@ -24,32 +24,24 @@ While [Java I2P](https://geti2p.net) is being original client for I2P network, i
* i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers).
* i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers).
* i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy.
* i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy.
## What can I use i2pd for?
## Why is the i2p network so slow and unstable sometimes?
i2pd can be used to organize anonymous network layer for any of your applications.
By design, in the i2p network, your connection gets encrypted through a chain of 6
You can run websites, create public and private chatrooms, use instant
messaging and E-Mail, share files -- do everything with strong privacy and
security layer.
## Why is network so slow and unstable sometimes?
Because it's secure design, your network connection goes encrypted through a chain of 6
random computers in the way to it's final destination. If one of those computers
random computers in the way to it's final destination. If one of those computers
is shut down, or experiences connectivity problems -- it can take some time for
is shut down, or experiences connectivity problems, it can take some time for your
I2P router to discover and fix that issue.
I2P router to discover and fix that issue.
## Help! i2pd is not working. What to do?
## Help! i2pd is not working. What do I do?
First of all, synchronize system clock on your machine with Internet.
First of all, synchronize system clock on your machine with Internet.
If that does not help, on Linux machines, check the number of open file descriptors
If that does not help, on Linux machines, check the number of open file descriptors
allowed to a process. Run:
allowed to a process. In a terminal, run:
ulimit -n
ulimit -n
Correct value for regular i2pd node is 4096, for a floodfill it is 8192.
Correct value for regular i2pd node is 4096, for a floodfill it is 8192.
Set it before you run i2pd like that:
Set it before you run i2pd like so:
ulimit -n 4096 && ./i2pd
ulimit -n 4096 && ./i2pd
@ -60,9 +52,9 @@ Contact developers with IRC or create an issue on GitHub.
Average values are 15% - 40%. Larger is better.
Average values are 15% - 40%. Larger is better.
## Are there any alive I2P websites?
## Is there a place I can use to find running i2p websites?
Sure, there is a list of alive websites [here](http://identiguy.i2p.xyz/)
Sure, there is a list [here](http://identiguy.i2p.xyz/)
## How can I better integrate my router to the network?
## How can I better integrate my router to the network?
@ -72,29 +64,31 @@ Run i2pd for a long time, download and seed some popular torrents.
## What browser should I use to browse I2P websites?
## What browser should I use to browse I2P websites?
Use any open source browser - for example, Firefox or Chromium based. Create separate profile for I2P ([firefox instructions](https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles)), try not to mix clearnet browsing with I2P. Learn how to configure your browser for better privacy and security.
Use any open source browser - for example, Firefox or a Chromium based alternative. Create separate profile for I2P ([firefox instructions](https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles)),
and try not to mix clearnet browsing with I2P. Learn how to configure your browser for better privacy and security.
Good idea is to configure [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time.
Configuring [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time is a good idea.
i2pd socks proxy has an option to pass all non-I2P traffic to Tor socks proxy. Make sure you know what are you doing!
i2pd's socks proxy has an option to pass all non-I2P traffic to the Tor socks proxy. Make sure you know what are you doing when using this!
## What is a floodfill mode?
## What is a floodfill mode?
Floodfill mode is a special mode, which contributes to I2P network more.
Floodfill mode is a special mode, which contributes to the I2P network more.
You may want to enable floodfill mode if you have stable uptime and high bandwidth
You may want to enable floodfill mode if you have stable uptime and high bandwidth
to share.
to share.
## How is I2P different from Tor?
## How is I2P different from Tor?
I2P and Tor has some similarities, but they are completely different in every way possible.
I2P and Tor have some similarities, but they are completely different technologies.
Tor is designed to act as anonymous proxy for the regular Internet, I2P is
Tor is designed to act as an anonymous proxy for the regular Internet, and I2P is
designed to create anonymous network layer with its own private resources.
a network layer wherein all network participants adhere to a protocol that protects
the anonymity and privacy of all communications between users.
Tor Project was started by US military and has a long history of receiving funds
Tor Project was started by the US military and receives most of its funds
from the government, while I2P was started by community of independent civilians.
from the government, while I2P was started by a community of independent civilians.
Tor is highly centralized by design, while I2P is decentralized and distributed.
Tor is highly centralized by design, while I2P is less so.