Browse Source

Merge pull request #19 from l-n-s/revert

Revert
pull/21/head
l-n-s 6 years ago committed by GitHub
parent
commit
cff051a5d3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 8
      docs/index.md
  2. 26
      docs/user-guide/FAQ.md

8
docs/index.md

@ -3,15 +3,15 @@
Invisible Internet Protocol (daemon) Invisible Internet Protocol (daemon)
==================================== ====================================
i2pd (I2P Daemon) is a fully-featured C++ daemon to enable application-independent i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client.
use of I2P.
I2P (Invisible Internet Protocol) is a universal anonymous network layer. I2P (Invisible Internet Protocol) is a universal anonymous network layer.
All communications over I2P are anonymous and end-to-end encrypted, participants All communications over I2P are anonymous and end-to-end encrypted, participants
don't reveal their real IP addresses. don't reveal their real IP addresses.
I2P is commonly used for anonymous peer-to-peer applications I2P client is a software used for building and using anonymous I2P
(filesharing, cryptocurrencies) and anonymous client-server networks. Such networks are commonly used for anonymous peer-to-peer
applications (filesharing, cryptocurrencies) and anonymous client-server
applications (websites, instant messengers, chat-servers). applications (websites, instant messengers, chat-servers).
I2P allows people from all around the world to communicate and share information I2P allows people from all around the world to communicate and share information

26
docs/user-guide/FAQ.md

@ -1,13 +1,13 @@
## What is I2P? ## What is I2P?
I2P (Invisible Internet Protocol) is a universal anonymous network layer. I2P (Invisible Internet Protocol) is a universal anonymous network layer.
All communications over I2P are anonymous and end-to-end encrypted; All communications over I2P are anonymous and end-to-end encrypted, participants
participants don't reveal their real IP addresses. don't reveal their real IP addresses.
i2pd is an implemmentation of the I2P protocol in C++. I2P client is a software used for building and using anonymous I2P
i2pd is used to facilitate anonymous peer-to-peer applications networks. Such networks are commonly used for anonymous peer-to-peer
(filesharing, cryptocurrencies) and anonymous client-server applications applications (filesharing, cryptocurrencies) and anonymous client-server
(websites, instant messengers, chat-servers), all using I2P. applications (websites, instant messengers, chat-servers).
I2P allows people from all around the world to communicate and share information I2P allows people from all around the world to communicate and share information
without restrictions. without restrictions.
@ -24,9 +24,9 @@ While [Java I2P](https://geti2p.net) and i2pd are both clients for the I2P netwo
* i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers). * i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers).
* i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy. * i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy.
## Why is the i2p network so slow and unstable sometimes? ## Why is the I2P network so slow and unstable sometimes?
By design, in the i2p network, your connection gets encrypted through a chain of 6 By design, in the I2P network, your connection gets encrypted through a chain of 6
random computers in the way to it's final destination. If one of those computers random computers in the way to it's final destination. If one of those computers
is shut down, or experiences connectivity problems, it can take some time for your is shut down, or experiences connectivity problems, it can take some time for your
I2P router to discover and fix that issue. I2P router to discover and fix that issue.
@ -52,7 +52,7 @@ Contact developers with IRC or create an issue on GitHub.
Average values are 15% - 40%. Larger is better. Average values are 15% - 40%. Larger is better.
## Is there a place I can use to find running i2p websites? ## Is there a place I can use to find running I2P websites?
Sure, there is a list [here](http://identiguy.i2p.xyz/) Sure, there is a list [here](http://identiguy.i2p.xyz/)
@ -81,14 +81,14 @@ to share.
I2P and Tor have some similarities, but they are completely different technologies. I2P and Tor have some similarities, but they are completely different technologies.
Tor is designed to act as an anonymous proxy for the regular Internet, and I2P is Tor is designed to act as an anonymous proxy for the regular Internet, and I2P
a network layer wherein all network participants adhere to a protocol that protects is specifically designed to make a virtual anonymous network for hidden services
the anonymity and privacy of all communications between users. and p2p applications.
Tor Project was started by the US military and receives most of its funds Tor Project was started by the US military and receives most of its funds
from the government, while I2P was started by a community of independent civilians. from the government, while I2P was started by a community of independent civilians.
Tor is highly centralized by design, while I2P is less so. Tor is highly centralized by design, while I2P is designed to be decentralized and distributed.
## Can use i2pd as a proxy for regular Internet? ## Can use i2pd as a proxy for regular Internet?

Loading…
Cancel
Save