News

Eepsites in I2P are addressed using a 'key', which is represented as a really long Base64 string. The key is somewhat analogous to an IP address and is shown on your eepsite's I2PTunnel ...
Every machine using I2P acts as a router, which makes I2P a fully decentralized service. This is a security strength, since traffic can travel down different network paths in a way that frustrates ...
It also allows I2P to use unidirectional tunnels—responses sent back to a request don't follow the same network path, making it more difficult to man-in-the-middle both parts of an I2P ...