Intro
I2P is an anonymous peer-to-peer network. I2P provides applications and tooling for communicating on a privacy-aware, self-defense, distributed network. The diva.exchange association is using I2P technology to design its network. Today we'll talk to Sadie, whose work focuses on outreach, secure usability, governance and digital rights. We will learn more about the current state of I2P technology, application areas, and the global I2P community. Here we go.
Part I: General introduction to the technology. New developments
Interviewer: Sadie, we know each other and Diva is actively using I2P technology. But now I ask you to tell our new users - what is I2P, what is the essence of this technology.
Sadie: The project began over 20 years ago with the intention of creating a network where the client is hidden from the server and the server is hidden from the client. There are two router distributions available for download - the core Java router and the I2pd, the c++ implementation. This software is free open source, and contributors are always welcome!
A history overview for the project was published a few years ago, for anyone who would like more details https://geti2p.net/en/blog/post/2021/08/28/History-of-I2P.
The I2P network is a peer-to-peer based overlay network. It functions with similar capacity to the clearnet (internet). I2P network traffic does not interact with the Internet directly.
The network uses two transports: NTCP2, a TCP based transport, and SSU2, a UDP transport. These offer DPI and pattern recognition resistance, and anonymity for network traffic. People can read more about the I2P transport layer here https://geti2p.net/en/docs/transport .
Encrypted unidirectional tunnels are used between connected routers. No one can see where traffic is coming from, where it is going, or what the contents are. The network also provides an application layer, and has its own unique DNS-like infrastructure.
Int: Tor technology is widely known in the field of anonymous Internet. Please tell me how I2P differs from Tor. What are the pros and cons of these safe/anonymous internet technologies?
S: The pros and cons are dependent on use case or workflow within an individuals privacy and anonymity threat model. Many people make comparisons between I2P and the Tor browser, or a VPN. However the I2P network was not designed to exit traffic and access content outside of the network. It is instead designed and optimized specifically for Hidden Services.
I2P network participants have the same status within the network, more-or-less. In I2P, everyone is a Client and a Router and no one is an Exit.
The I2P core distributions present a very broad use case within the software that includes how your router will connect to the I2P network, using I2P network applications, managing your own I2P service or site, and more. An I2P router also depends on configuring a browser to use a proxy so that it can connect to I2P sites, as well as make use of the outproxy service that provides an anonymized way to connect to sites outside of the I2P network. The outproxy service is operated by StormyCloud. (https://stormycloud.org/).
In both cases the pros are the technical achievements and continued efforts to offer people the option of privacy.
The cons are that there are still some places where people find using these options challenging. In some regions protocols are blocked, or sites are blocked. That means something will not work or a person cannot even access it.
Part II: Applications of I2P
Int: We touched on the relationship between I2P and Tor. The well-known decentralized exchange BISQ uses the Tor network. Diva.exchange, on the other hand, uses I2P. How applicable do you think the I2P network is when developing a distributed network like Diva?
S: The technologies and ontologies - distributed, private, censorship resistant - make the I2P network a good option for blockchain and financial privacy. There are many research and development opportunities ahead in this relationship with the extra scope that blockchain use cases bring to the network.
Int: Do you know of any other products that use I2P?
S: There are several projects that offer I2P integrations. You can run a Monero or Bitcoin node on the I2P network, for instance.
Applications or services that use email and BitTorrent protocols have I2P integrations as well, such as Susimail, Snark, and BiglyBT. The I2P application layer and APIs make it possible to make almost anything work on the network.
Part III: I2P community
Int: An important part of an I2P network is its active community. Please tell me more about it.
S: The I2P community is globally distributed, literally, since every person running a router is contributing to the network infrastructure. There is a development community that works on the core software options, networking and protocols. There are application developers that create services, and then there are infrastructure contributors - reseed, outproxy and jump service operators. There are people exploring the network for specific use cases, and its ability to support access in regions where censorship and protocol blocking is a challenge for people when trying to communicate with privacy.
Int: What are the specific characteristics of the I2P community in the US?
S: I guess we could look at something like I2P Metrics and get a technical overview of what sort of routers are running by region. Aside from routers by country data, there is no way to know anything about the identities or traffic connected to those routers.
Int: Who are its representatives and active participants, what are the specific features of the I2P community in the US?
S: In the I2P network location and identity are protected, so we can only know what people want us to know and choose to tell us. This applies to people who contribute as well. Over the past 20 years many people have attended conferences to talk about I2P all over the world. The core teams provide updates on their forums and irc with regards to roadmaps and development. They are always happy to welcome new contributors, and the i2p-dev irc channel is a great place to stay up to date on the release cycle and learn about how I2P works.
In the US there are lots of conferences like HOPE, USENIX, and DEF CON, hacker spaces, and organizations like EFF. These provide scaffolding for new and existing people to connect and work together on technologies, security and legal protections regarding online privacy. Being in proximity to good internet connectivity and a thriving hacker/ privacy/ digital rights culture certainly has an influence on a persons ability to participate in privacy technologies anywhere in the world.
Part IV: I2P Development
Int: in the I2P account on Reddit, I've come across posts like this: I'm a newbie, how can I help network development? What would you say to such users?
S: There are a lot of ways to support the project. Are you a designer or a programmer? Do you have experience with testing and giving feedback during a software release cycle? Can you help with translations? Do you have the resources to operate a reseed server? There are ways to directly support development. There are ways to support design and access. There are ways to strengthen infrastructure points.
Int: One last question. Let's fix it for our readers - where you can find information about the I2P network and instructions on connecting.
S: The project website (https://geti2p.net/) has most of the information people need, and there are people in the community who are creating new guides and tutorials all of the time for things that are outside of the scope of the website documentation. People can connect with the I2P community on Reddit (r/i2p), I2P Forum, and on irc. The project also has X and Mastodon accounts.
Intro I2P is an anonymous peer-to-peer network. I2P provides applications and tooling for communicating on a privacy-aware, self-defense, distributed network. The diva.exchange association is using I2P technology to design its network. Today we'll talk to Sadie, whose work focuses on outreach, secure usability, governance and digital rights. We will learn more about the current state of I2P technology, application areas, and the global I2P community. Here we go.
Part I: General introduction to the technology. New developments
Interviewer: Sadie, we know each other and Diva is actively using I2P technology. But now I ask you to tell our new users - what is I2P, what is the essence of this technology.
Sadie: The project began over 20 years ago with the intention of creating a network where the client is hidden from the server and the server is hidden from the client. There are two router distributions available for download - the core Java router and the I2pd, the c++ implementation. This software is free open source, and contributors are always welcome! A history overview for the project was published a few years ago, for anyone who would like more details https://geti2p.net/en/blog/post/2021/08/28/History-of-I2P.
The I2P network is a peer-to-peer based overlay network. It functions with similar capacity to the clearnet (internet). I2P network traffic does not interact with the Internet directly.
The network uses two transports: NTCP2, a TCP based transport, and SSU2, a UDP transport. These offer DPI and pattern recognition resistance, and anonymity for network traffic. People can read more about the I2P transport layer here https://geti2p.net/en/docs/transport .
Encrypted unidirectional tunnels are used between connected routers. No one can see where traffic is coming from, where it is going, or what the contents are. The network also provides an application layer, and has its own unique DNS-like infrastructure.
Int: Tor technology is widely known in the field of anonymous Internet. Please tell me how I2P differs from Tor. What are the pros and cons of these safe/anonymous internet technologies?
S: The pros and cons are dependent on use case or workflow within an individuals privacy and anonymity threat model. Many people make comparisons between I2P and the Tor browser, or a VPN. However the I2P network was not designed to exit traffic and access content outside of the network. It is instead designed and optimized specifically for Hidden Services. I2P network participants have the same status within the network, more-or-less. In I2P, everyone is a Client and a Router and no one is an Exit.
The I2P core distributions present a very broad use case within the software that includes how your router will connect to the I2P network, using I2P network applications, managing your own I2P service or site, and more. An I2P router also depends on configuring a browser to use a proxy so that it can connect to I2P sites, as well as make use of the outproxy service that provides an anonymized way to connect to sites outside of the I2P network. The outproxy service is operated by StormyCloud. (https://stormycloud.org/).
In both cases the pros are the technical achievements and continued efforts to offer people the option of privacy.
The cons are that there are still some places where people find using these options challenging. In some regions protocols are blocked, or sites are blocked. That means something will not work or a person cannot even access it.
Part II: Applications of I2P
Int: We touched on the relationship between I2P and Tor. The well-known decentralized exchange BISQ uses the Tor network. Diva.exchange, on the other hand, uses I2P. How applicable do you think the I2P network is when developing a distributed network like Diva?
S: The technologies and ontologies - distributed, private, censorship resistant - make the I2P network a good option for blockchain and financial privacy. There are many research and development opportunities ahead in this relationship with the extra scope that blockchain use cases bring to the network.
Int: Do you know of any other products that use I2P?
S: There are several projects that offer I2P integrations. You can run a Monero or Bitcoin node on the I2P network, for instance. Applications or services that use email and BitTorrent protocols have I2P integrations as well, such as Susimail, Snark, and BiglyBT. The I2P application layer and APIs make it possible to make almost anything work on the network.
Part III: I2P community
Int: An important part of an I2P network is its active community. Please tell me more about it.
S: The I2P community is globally distributed, literally, since every person running a router is contributing to the network infrastructure. There is a development community that works on the core software options, networking and protocols. There are application developers that create services, and then there are infrastructure contributors - reseed, outproxy and jump service operators. There are people exploring the network for specific use cases, and its ability to support access in regions where censorship and protocol blocking is a challenge for people when trying to communicate with privacy.
Int: What are the specific characteristics of the I2P community in the US?
S: I guess we could look at something like I2P Metrics and get a technical overview of what sort of routers are running by region. Aside from routers by country data, there is no way to know anything about the identities or traffic connected to those routers.
Int: Who are its representatives and active participants, what are the specific features of the I2P community in the US?
S: In the I2P network location and identity are protected, so we can only know what people want us to know and choose to tell us. This applies to people who contribute as well. Over the past 20 years many people have attended conferences to talk about I2P all over the world. The core teams provide updates on their forums and irc with regards to roadmaps and development. They are always happy to welcome new contributors, and the i2p-dev irc channel is a great place to stay up to date on the release cycle and learn about how I2P works.
In the US there are lots of conferences like HOPE, USENIX, and DEF CON, hacker spaces, and organizations like EFF. These provide scaffolding for new and existing people to connect and work together on technologies, security and legal protections regarding online privacy. Being in proximity to good internet connectivity and a thriving hacker/ privacy/ digital rights culture certainly has an influence on a persons ability to participate in privacy technologies anywhere in the world.
Part IV: I2P Development
Int: in the I2P account on Reddit, I've come across posts like this: I'm a newbie, how can I help network development? What would you say to such users?
S: There are a lot of ways to support the project. Are you a designer or a programmer? Do you have experience with testing and giving feedback during a software release cycle? Can you help with translations? Do you have the resources to operate a reseed server? There are ways to directly support development. There are ways to support design and access. There are ways to strengthen infrastructure points.
Int: One last question. Let's fix it for our readers - where you can find information about the I2P network and instructions on connecting.
S: The project website (https://geti2p.net/) has most of the information people need, and there are people in the community who are creating new guides and tutorials all of the time for things that are outside of the scope of the website documentation. People can connect with the I2P community on Reddit (r/i2p), I2P Forum, and on irc. The project also has X and Mastodon accounts.