What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

Photo: Sergio Moraes / Global Look Press

To get to the sites of the I2P network (Invisible Internet Project) - the anonymous counterpart of the Internet - you cannot use it in the usual way, because this twin is invisible. Since 2003, I2P has been created as a parallel Internet operating independently of the mainstream Internet. Getting into I2P is harder than setting up a service and simple Tor. Lenta.ru has figured out why a user should go through the mirror through the net.

I2P and Tor: mushroom rather than onion

Having inherited the principles of work of early peer-to-peer networks, I2P was guided by an anonymous exchange of content, and grew into a whole alternative Internet-2. Which, however, is still a bit like torrents and is expanding at the expense of reliable network members.

An I2P network is easy to imagine by imagining an extensive tunnel system resembling a mycelium or mycelium. This invisible, underground part of the mushroom from time immemorial brings a romantic fantasy about the mushroom mind to a person. And if the visible part of the mycelium is the fruit bodies of mushrooms, spreaders of genetic information,These I2P sites are visible capsules with inaccessible knowledge stored in a secret information tunnel system. Graphically, the mechanism of Tor with its branches, chains and nodes also fit into the mushroom scheme.

What is hidden in the most anonymous network of the world?

Photo: Adam Berry / Getty Images

But Tor and I2P mycelium are different in purpose. While the former provides anonymous browsing of external resources and access to pages hidden in the depth and darkness of the lower Internet, I2P is such a global club whose members anonymously exchange content and use a unique network infrastructure.

Both worse

Restless seekers of unconditional confidentiality have argued for several years about whether Tor or I2P is safer to use, but there is no consensus. With a combination of certain factors, a well-motivated attacker or state well-wisher can track you both there and there. The difference in security between these two streams of the deep-sea Internet is mainly reduced to image.

I2P is available on most modern devices and operating systems from Windows to Android. Although the installation does not require special technical skills from the user, a lot of time will have to be spent on mastering, which increases the rating of the system in the eyes of newbies, and spoils the impression of the product to professionals.

Ordinary consumers tend to trust more complex and incomprehensible systems (and equipped with a fastidious entry point) - they seem to be more reliable. In reality, complexity is the main security threat. Initially, I2P is a semi-handicraft attempt at an ideological, but technically weak specialist. Therefore, the critics of I2P continually remind of the low origin of the system, its sluggishness and congestion with chaotic solutions. They are sure that the hysterical desire of the dilettante developer to dress his brainchild at once in the best of all had a negative effect on safety.

The Tor credibility index is higher for an advanced audience: after all, the product was developed by a research laboratory close to the US Navy upon request and with the support of influential structures like the Department of Defense, who absolutely needed secure data transmission.

However, the experienced and not too neurotized part of the darknet regulars doesn’t notice the functional difference between Tor and I2P. In both cases, they have to use the same encryption method and know in advance exactly what resource they want and how exactly the address is written.In any case, even in the most secure networks there will always be ubiquitous phishing copies of the site, which tend to shake out other people's crypto shells or at least hijack your account.

I2P resources for decorating virtual life and saving real

The services and content of the I2P network differ from the resources demanded in Tor and serve mainly the interests of crypto-financiers and buyers with non-standard requests (and occasionally showing cats and other entertainment from the world of the normal patsan Internet). I2P, on the other hand, looks more like a completely good looking mirror of the mainstream Internet. First of all, the network is useful for anonymous users who prefer sophisticated encryption.

First of all, I2P activists provide the basic network needs of users. Here you can choose or create your own email services and clients for them, instant messengers, torrent trackers, hosting services, dating services and mutual assistance - all without which the network cannot be considered global.

This is followed by the fundamental things: the protection and realization of human rights through the support of Hidden Services for refugees and dissidents in the Middle East, the provision of platforms for posting materials from anti-globalists like Wikileaks, GlobalLeaks and Indymedia.Numerous conferences and chats are supervised by specialists in psychology and psychiatry who advise those suffering from the consequences of military conflicts, domestic and sexual violence and mental disorders.

You can start mastering I2P from the official online representation of the network, the most comprehensive catalogs of sites of different directions and available services.

What is hidden in the most anonymous network of the world?

Photo: Vincent West / Reuters

For frivolous leisure it is worth going to the mirrored version of bash.org. Misanthropes also recommend a strangely constructed social (but anonymous) network Onelon. In addition, there is a more twitter-like service microblogging.

To the services of the lost - a fairly effective search engine, and things can be left on a free hosting. Carry with you something useful, but not very heavy will succeed with a torrent tracker. Well, remember image entertainment zero will always help imageboard. Still having doubts about the safety of their actions, a detailed guide on how to protect data is waiting.

Effective elevation over everyday life

For users who are prone to relapse into immoral behavior, they also identified several corners.This is, for example, the great and categorically forbidden, but lively tracker The Pirate Bay, which almost single-handedly ruined the industry of physical music carriers.

Before plunging into the main (and of course pirated, of course) network libraries gathered at the screens, you should familiarize yourself with the monstrous turnover of Flibusta and its branches.

What is hidden in the most anonymous network of the world?

Screenshot: vice.com

What is hidden in the most anonymous network of the world?

Screenshot: nvspc.i2p

A couple of years ago, in a weakly criminal I2P network, a new platform nevertheless earned a large-scale Silk Road Reloaded. She easily occupied a niche in 2013 of the classic Silk Road drug sales platform that operated through Tor. The largest forum of its kind has moved to a much more anonymous space, where, by the way, Russian counterparts also live.

Related news

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world?

What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world? What is hidden in the most anonymous network of the world?