I2P Network Security for Participants and Admins
Index
- History
- I2P Java Overview
- i2pD Overview
- Research Summary of vulnerabilities
- Network Threat Model
- Personal Threat Model
- OPSEC
- OS and environment hardening
- I2P configuration defaults
- I2P Configurations for advanced threat modelling
- Best practices for admins and service operators