i2P Network- The Invisible Internet Project (I2P) is free and open source, an anonymous network layer (implemented as a Mix Network) that allows for censorship-resistant, peer to peer communication.
i2P to built decentralized anonymous network.
Anonymous connections are achieved by encrypting the user’s traffic (by using end-to-end encryption), exposing a simple layer that applications can use to anonymously and securely send messages to each other.
The software that implements this layer is called an “I2P router”, and a computer running I2P is called an “I2P node”.
How does it work?
To anonymize the messages sent, each client application has their I2P “router” build a few inbound and outbound “tunnels” – a sequence of peers that pass messages in one direction (to and from the client, respectively).
In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client’s inbound tunnels, eventually reaching the destination
Since I2P is an anonymous network layer, it is designed so other software can use it for anonymous communication. As such, there are a variety of tools currently available for I2P or in development.
The I2P router is controlled through the router console, which is a web frontend accessed through a web browser.
Also Read- 5 Top Virtual Private Network
General networking
- I2PTunnel is an application embedded into I2P that allows arbitrary TCP/IP applications to communicate over I2P by setting up “tunnels” which can be accessed by connecting to pre-determined ports on localhost.
- SAM (Simple Anonymous Messaging) is a protocol which allows a client application written in any programming language to communicate over I2P, by using a socket-based interface to the I2P router.
- BOB (Basic Open Bridge) is a less complex app to router protocol similar to “SAM”
- Orchid Outproxy Tor plugin
i2P-Bote For Encrypted E-mail
i2P-Bote is a plugin for I2P that allows users to send and receive emails while preserving privacy. It does not need a mail server because emails are stored in a distributed hash table. They are automatically encrypted and digitally signed, which ensures no one but the intended recipient can read the email, and third parties cannot forge them.
Features
- Themeable webmail interface
- User interface translated in many languages
- One-click creation of email accounts (called email identities)
- Emails can be sent under a sender identity, or anonymously
- ElGamal, Elliptic Curve, and NTRU Encryption
- Encryption and signing is transparent, without the need to know about PGP
- Delivery confirmation
- Basic support for short recipient names
- IMAP / SMTP
You can get here
https://github.com/i2p/i2p.i2p-bote
I2P-Messenger
It is a simple Qt-based, serverless, end-to-end-encrypted instant messenger for I2P.[56] No servers can log the user’s conversations. No ISP can log with whom the user chats, when, or for how long.
As it is serverless, it can make use of I2P’s end-to-end encryption, preventing any node between two parties from having access to the plain text.
I2P-Messenger can be used for fully anonymous instant communication with persons the user doesn’t even know, or, alternatively, to communicate securely and untraceably with friends, family members, or colleagues. In addition to messaging, file transfer is also supported.