mirror of
https://github.com/PurpleI2P/i2pd_docs_en
synced 2025-01-11 23:47:51 +00:00
Merge pull request #16 from hugbubby/master
Fix grammar and some questions about lexicon.
This commit is contained in:
commit
d829a2a15c
@ -3,15 +3,15 @@
|
||||
Invisible Internet Protocol (daemon)
|
||||
====================================
|
||||
|
||||
i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client.
|
||||
i2pd (I2P Daemon) is a fully-featured C++ daemon to enable application-independent
|
||||
use of I2P.
|
||||
|
||||
I2P (Invisible Internet Protocol) is a universal anonymous network layer.
|
||||
All communications over I2P are anonymous and end-to-end encrypted, participants
|
||||
don't reveal their real IP addresses.
|
||||
|
||||
I2P client is a software used for building and using anonymous I2P
|
||||
networks. Such networks are commonly used for anonymous peer-to-peer
|
||||
applications (filesharing, cryptocurrencies) and anonymous client-server
|
||||
I2P is commonly used for anonymous peer-to-peer applications
|
||||
(filesharing, cryptocurrencies) and anonymous client-server
|
||||
applications (websites, instant messengers, chat-servers).
|
||||
|
||||
I2P allows people from all around the world to communicate and share information
|
||||
|
@ -1,22 +1,22 @@
|
||||
## What is I2P?
|
||||
|
||||
I2P (Invisible Internet Protocol) is a universal anonymous network layer.
|
||||
All communications over I2P are anonymous and end-to-end encrypted, participants
|
||||
don't reveal their real IP addresses.
|
||||
All communications over I2P are anonymous and end-to-end encrypted;
|
||||
participants don't reveal their real IP addresses.
|
||||
|
||||
I2P client is a software used for building and using anonymous I2P
|
||||
networks. Such networks are commonly used for anonymous peer-to-peer
|
||||
applications (filesharing, cryptocurrencies) and anonymous client-server
|
||||
applications (websites, instant messengers, chat-servers).
|
||||
i2pd is an implemmentation of the I2P protocol in C++.
|
||||
i2pd is used to facilitate anonymous peer-to-peer applications
|
||||
(filesharing, cryptocurrencies) and anonymous client-server applications
|
||||
(websites, instant messengers, chat-servers), all using I2P.
|
||||
|
||||
I2P allows people from all around the world to communicate and share information
|
||||
without restrictions.
|
||||
|
||||
Deeper technical introduction of I2P can be found [here](https://geti2p.net/en/docs/how/tech-intro).
|
||||
A deeper technical introduction of I2P can be found [here](https://geti2p.net/en/docs/how/tech-intro).
|
||||
|
||||
## How i2pd differs from original I2P implementation?
|
||||
|
||||
While [Java I2P](https://geti2p.net) is being original client for I2P network, i2pd has some big differences and advantages:
|
||||
While [Java I2P](https://geti2p.net) and i2pd are both clients for the I2P network, i2pd has some big differences and advantages:
|
||||
|
||||
* Java I2P has built-in applications for torrents, e-mail and so on. i2pd is just a router which you can use with other software through I2CP interface.
|
||||
* i2pd does not require Java. It's written in C++.
|
||||
@ -24,32 +24,24 @@ While [Java I2P](https://geti2p.net) is being original client for I2P network, i
|
||||
* i2pd can be compiled everywhere gcc or clang presented (including Raspberry and routers).
|
||||
* i2pd has some major optimizations for faster cryptography which leads to less consumption of processor time and energy.
|
||||
|
||||
## What can I use i2pd for?
|
||||
## Why is the i2p network so slow and unstable sometimes?
|
||||
|
||||
i2pd can be used to organize anonymous network layer for any of your applications.
|
||||
|
||||
You can run websites, create public and private chatrooms, use instant
|
||||
messaging and E-Mail, share files -- do everything with strong privacy and
|
||||
security layer.
|
||||
|
||||
## Why is network so slow and unstable sometimes?
|
||||
|
||||
Because it's secure design, your network connection goes encrypted through a chain of 6
|
||||
By design, in the i2p network, your connection gets encrypted through a chain of 6
|
||||
random computers in the way to it's final destination. If one of those computers
|
||||
is shut down, or experiences connectivity problems -- it can take some time for
|
||||
is shut down, or experiences connectivity problems, it can take some time for your
|
||||
I2P router to discover and fix that issue.
|
||||
|
||||
## Help! i2pd is not working. What to do?
|
||||
## Help! i2pd is not working. What do I do?
|
||||
|
||||
First of all, synchronize system clock on your machine with Internet.
|
||||
|
||||
If that does not help, on Linux machines, check the number of open file descriptors
|
||||
allowed to a process. Run:
|
||||
allowed to a process. In a terminal, run:
|
||||
|
||||
ulimit -n
|
||||
|
||||
Correct value for regular i2pd node is 4096, for a floodfill it is 8192.
|
||||
Set it before you run i2pd like that:
|
||||
Set it before you run i2pd like so:
|
||||
|
||||
ulimit -n 4096 && ./i2pd
|
||||
|
||||
@ -60,9 +52,9 @@ Contact developers with IRC or create an issue on GitHub.
|
||||
|
||||
Average values are 15% - 40%. Larger is better.
|
||||
|
||||
## Are there any alive I2P websites?
|
||||
## Is there a place I can use to find running i2p websites?
|
||||
|
||||
Sure, there is a list of alive websites [here](http://identiguy.i2p.xyz/)
|
||||
Sure, there is a list [here](http://identiguy.i2p.xyz/)
|
||||
|
||||
## How can I better integrate my router to the network?
|
||||
|
||||
@ -72,29 +64,31 @@ Run i2pd for a long time, download and seed some popular torrents.
|
||||
|
||||
## What browser should I use to browse I2P websites?
|
||||
|
||||
Use any open source browser - for example, Firefox or Chromium based. Create separate profile for I2P ([firefox instructions](https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles)), try not to mix clearnet browsing with I2P. Learn how to configure your browser for better privacy and security.
|
||||
Use any open source browser - for example, Firefox or a Chromium based alternative. Create separate profile for I2P ([firefox instructions](https://support.mozilla.org/en-US/kb/profile-manager-create-and-remove-firefox-profiles)),
|
||||
and try not to mix clearnet browsing with I2P. Learn how to configure your browser for better privacy and security.
|
||||
|
||||
Good idea is to configure [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time.
|
||||
Configuring [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time is a good idea.
|
||||
|
||||
i2pd socks proxy has an option to pass all non-I2P traffic to Tor socks proxy. Make sure you know what are you doing!
|
||||
i2pd's socks proxy has an option to pass all non-I2P traffic to the Tor socks proxy. Make sure you know what are you doing when using this!
|
||||
|
||||
## What is a floodfill mode?
|
||||
|
||||
Floodfill mode is a special mode, which contributes to I2P network more.
|
||||
Floodfill mode is a special mode, which contributes to the I2P network more.
|
||||
You may want to enable floodfill mode if you have stable uptime and high bandwidth
|
||||
to share.
|
||||
|
||||
## How is I2P different from Tor?
|
||||
|
||||
I2P and Tor has some similarities, but they are completely different in every way possible.
|
||||
I2P and Tor have some similarities, but they are completely different technologies.
|
||||
|
||||
Tor is designed to act as anonymous proxy for the regular Internet, I2P is
|
||||
designed to create anonymous network layer with its own private resources.
|
||||
Tor is designed to act as an anonymous proxy for the regular Internet, and I2P is
|
||||
a network layer wherein all network participants adhere to a protocol that protects
|
||||
the anonymity and privacy of all communications between users.
|
||||
|
||||
Tor Project was started by US military and has a long history of receiving funds
|
||||
from the government, while I2P was started by community of independent civilians.
|
||||
Tor Project was started by the US military and receives most of its funds
|
||||
from the government, while I2P was started by a community of independent civilians.
|
||||
|
||||
Tor is highly centralized by design, while I2P is decentralized and distributed.
|
||||
Tor is highly centralized by design, while I2P is less so.
|
||||
|
||||
## Can use i2pd as a proxy for regular Internet?
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user