-
Updated
Jul 30, 2021 - C++
#
i2p
Here are 121 public repositories matching this topic...
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
-
Updated
Jul 30, 2021 - Java
Feature-filled Bittorrent client based on the Azureus open source project
-
Updated
Jul 30, 2021 - Java
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
tunnel
proxy
mitm
tor
sniffer
reverse-proxy
shadowsocks
v2ray
network-visualization
gfw
i2p
port-knocking
tunnelvpn
protocol-analysis
network-spoof
network-poison
network-forensic
-
Updated
Dec 30, 2019
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
open-source
security
encryption
irc
debian
virtualization
anonymity
tor-network
i2p
physical-isolation
hide-real-ip
privacy-protection
dns-leak-prevention
-
Updated
Jul 25, 2021 - Shell
Android application for Internet privacy and security
-
Updated
Jul 11, 2021 - Java
infrastructure
golang
data
storage
ethereum
ipfs
swarm
pinning
i2p
temporal
ipns
ipfs-cluster
ethereum-swarm
-
Updated
Jan 13, 2021 - Go
majestrate / XD
Official repository of OnionCat, the VPN adapter for Tor and I2P.
-
Updated
Jul 20, 2021 - C
docker
docker-compose
ipfs
distributed-computing
tor
distributed-storage
sia
boinc
kiwix
i2p
foldingathome
storj
pywb
internet-archiving
archivebox
good-karma
archivewarrior
zimfarm
-
Updated
May 31, 2021
Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forces all traffic through the Tor network, has support for other networks such as I2P and is hardened a lot for security. All data is lost at shutdown as it is run from RAM.
-
Updated
Dec 7, 2020 - Shell
Denarius [$D] is a PoW/PoS Hybrid Cryptocurrency with Tribus a new PoW Hashing Algo built specifically for D, one of a kind hybrid masternodes called Fortuna Stakes, atomic swaps, staking, mining, IPFS, optional Native Tor and I2P, and much more!
crypto
bitcoin
ipfs
decentralized
blockchain
d
p2p
tor
cryptocurrency
i2p
blockchain-technology
altcoins
stake
satoshi
masternodes
atomic-swaps
denarius
tribus-pow
pos-hybrid
tribus-algorithm
-
Updated
Jul 29, 2021 - C
I2P router implementation in Rust
-
Updated
Dec 16, 2019 - Rust
A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
-
Updated
Nov 3, 2019
Library to enable decentralized web requests
-
Updated
Jul 2, 2021 - C++
GOST R 34.11-2012 algo, GOST R 34.10-2012 signature
-
Updated
Jul 8, 2021 - C++
eyedeekay
commented
Mar 3, 2020
When the proxy isn't ready, but the user enters an I2P browsing tab, provide a descriptive error page to guide the user to a solution, even if that solution is to tell them to wait 2 minutes.
States should be described:
- Router Not Present: There is no indication that I2P is installed on the system. Direct them to an I2P distribution.
- HTTP Proxy Not Ready: The router is present, but th
-
Updated
May 24, 2020 - C++
A list of basic privacy-focused enhancements
-
Updated
Aug 28, 2020
Improve this page
Add a description, image, and links to the i2p topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the i2p topic, visit your repo's landing page and select "manage topics."


If the user is using i2p-zero for I2P, chances are they don't have an I2CP port exposed, which we use to detect the presence of an I2P router before attempting to connect to SAM. That way if the router is present but SAM isn't enabled we can advise the user to enable it. So instead, we need to check for I2CP, then attempt to connect to SAM. That way we have 4 states. No I2CP or SAM, I2CP but not S