this post was submitted on 09 Sep 2025
17 points (100.0% liked)

The Invisible Internet Project

1792 readers
1 users here now

I2P Community Edition

This isn't the official I2P channel, if you want go there then you can find it in the links below.

Rules

"Don't be a dick" - Wil Wheaton

General

Media:

File Hosting and Pastebins

Torrents

Social Networks and Microblogging

Exploring I2P

I2P Name Registries

Search engines

IRC

Irc2P comes pre-configured with I2P. To connect with other networks, please follow this tutorial.

Syndie

An open source system for operating distributed forums in anonymous networks

Inproxies

You can use inproxies to surf the I2P network without having to have an I2P router.

Follow us on Twitter

founded 2 years ago
MODERATORS
 

Work continues on the implementation and deployment of post-quantum cryptography in I2P. In this release post-quantum cryptography is available but not turned on by default for new tunnels. Those of you interested in testing post-quantum support should enable it via the "Hidden Service Manager" under "Encryption Types." Be sure to get in touch on #i2p-dev in IRC2P for help and to report any issues you encounter.

I2PSnark now supports UDP trackers. This should help the network overall by reducing the load of torrent trackers.

Stability improvements have been made to the Hidden Mode which will reduce the chance of running out of RouterInfos.

Important! In the next release, I2P will require Java 17 or later.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

you are viewing a single comment's thread
view the rest of the comments
[–] shortwavesurfer@lemmy.zip 3 points 1 week ago* (last edited 1 week ago) (4 children)

Yes, it's an anti-denial of service measure. It makes each connection to a hidden service do a small amount of computational work in order to get put into a queue. The more work you do, the higher in the queue you get. When a tor hidden service is under attack and you go to connect to it, when you get the hidden service information from the directory authority, you are told what the suggested proof of work is at that time.

It has been an extremely effective measure and has stopped a lot of connection issues.

[–] CAVOK@lemmy.world 1 points 1 week ago (2 children)

Nice, and thanks for the explanation. Do you know if this is a planned feature?

[–] shortwavesurfer@lemmy.zip 1 points 1 week ago (1 children)
[–] CAVOK@lemmy.world 1 points 1 week ago

Perhaps add it as a feature request? I'm not sure exactly what it is or how to describe it, but if you do then please help out.

load more comments (1 replies)