2018-5-3 · I2P网络是由I2P路由器以大蒜路由方式组成的表层网络,建立于其上的应用程序可以安全匿名的相互通信。它可以同时使用UDP及TCP协议,支持UPnP映射。其应用包括匿名上網、聊天、撰寫博客和檔案傳輸。 1.介绍 1. I2P与TOR

##### tor: 1、在torrc文件末尾添加下面内容,torrc文件位置 :\Tor Browser\Browser\TorBrowser\Data\Tor(torbrowser),二进制版本的:C:\user\username 9050是自己定义的传出端口,设置在outgoing connections那里的,我直接选了默认省的你们还要去修改。 I2PHelper HowTo - VuzeWiki 2017-2-28 · enabled=yes peer_set I2P=I2P peer_set NotI2P=I2P, inverse=yes Once set up these Peer Sets will appear in the side bar and you can right-click on them to set rate limits as required. Peer Sets support a rate limit of 'Disabled' which when set prevents all transfer of … Tunnels in I2P are short lived, decreasing the number of samples that an attacker can use to mount an active attack with, unlike circuits in Tor, which are typically long lived. I2P APIs are designed specifically for anonymity and security, while SOCKS is designed for functionality. I2P is an anonymous network built on top of the internet. It allows users to create and access content and build online communities on a network that is both distributed and dynamic. It is intended to protect communication and resist monitoring by third parties such as ISPs. Tor is a much larger and more mature network that has significant funding and has already addressed some of the scalability issues that I2P hasn’t yet experienced. While both Tor and I2P provide access to the Clearnet as well as hidden services, their emphasis is the opposite. As mentioned above, I2P routes traffic differently than Tor. At its heart, I2P performs packet based routing as opposed to Tor’s circuit based routing. This has the benefit of permitting I2P to dynamically route around congestion and service interruptions in a manner similar to the internet’s IP routing.

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

i2p_百度百科 2018-2-8 · I2P做为消息机制为基础的中间件与这些匿名性程序协同工作 - 程序要求发送数据给某一加密标识(目标),I2P来处理并保证数据安全匿名的到达#目标。I2P还带有易用的流封装库,可将I2P匿名消息转换为可靠有序的数据流传输,提供基于TCP协议的拥堵控制算法解决网络程序的宽带延迟问题。 “暗网”真的有那么可怕吗? - 知乎 2018-6-8 · Tor Tor就是这样一种匿名网络。但是Tor还采用了更多措施来保证使用者的安全。首先,使用Tor访问网络不仅仅只用一层代理,而是采用了多层代理。 其次,Tor在每一层代理都进行了加密,层层加密使得信息的来源得到保护。就像一个洋葱,只有把每一层都剥开,才能看到核心。

Tunnels in I2P are short lived, decreasing the number of samples that an attacker can use to mount an active attack with, unlike circuits in Tor, which are typically long lived. I2P APIs are designed specifically for anonymity and security, while SOCKS is designed for functionality.

An Introduction to Tor vs I2P - ivpn.net