I2P Anonymous Network
https://geti2p.net/
The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet.
I2P - Wikipedia
https://en.wikipedia.org/wiki/I2P
Development and societal aspects. Timeline. Legality. BitTorrent issues. By country or region. Canada. Japan. Singapore. UK. US. Comparisons. Comparison of BitTorrent clients.
The I2P Project · GitHub
https://github.com/i2p
The I2P Project has 20 repositories available. Follow their code on GitHub. I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate.
i2p — anonymous network
https://www.reddit.com/r/i2p/
A subreddit for information and discussions related to the I2P anonymous network. It's not recommended as that is not the main use of I2P, but you can.
What is I2P: How to install + Use, Garlic Routing, Eepsites & I2P vs Tor
https://www.comparitech.com/blog/vpn-privacy/i2p-install-use-guide/
Tor is mature and stable, but if you're looking to run a full-on dark web site that remains as hidden as possible, I2P may be the better choice.
How To Use I2P | I2P Tutorial & Setup Guide
https://thetinhat.com/tutorials/darknets/i2p.html
A lot of this attention has been focused on Tor and hidden services such as the Silk Road, though Tor is only the tip of the iceberg when it comes to 'darknets'. I2P is another large anonymizing network that...
What is I2P? What is I2P used for? How to use I2P? | Complete guide
https://proprivacy.com/privacy-service/guides/i2p-guide
In the following article, we are going to provide you with a step by step I2P guide that is simple to If you already know what I2P is, then go ahead and jump straight to our step-by-step how to use I2P...
What Is I2P & How Does It Compare vs. Tor Browser in 2020?
https://blokt.com/guides/what-is-i2p-vs-tor-browser
In this extensive I2P guide we look at what the Invisible Internet Project is, how it works, and how to Then we'll look at how you can get connected to I2P and start taking advantage of the anonymity it...