-
Updated
Apr 1, 2022 - C++
#
i2p
Here are 138 public repositories matching this topic...
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
-
Updated
Mar 31, 2022 - Java
Feature-filled Bittorrent client based on the Azureus open source project
-
Updated
Mar 31, 2022 - Java
Alternative privacy-respecting frontends for popular services 🔐 🌐
alternative
security
tracking
awesome
privacy
decentralized
tor
ads
anonymity
adblock
awesome-list
loki
web3
decentralization
i2p
ethics
security-tools
privacy-tools
-
Updated
Mar 25, 2022
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
tunnel
proxy
mitm
tor
sniffer
reverse-proxy
shadowsocks
v2ray
network-visualization
gfw
i2p
port-knocking
tunnelvpn
protocol-analysis
network-spoof
network-poison
network-forensic
-
Updated
Dec 30, 2019
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
open-source
security
encryption
irc
debian
virtualization
anonymity
tor-network
i2p
physical-isolation
hide-real-ip
privacy-protection
dns-leak-prevention
-
Updated
Mar 18, 2022 - Shell
Android application for Internet privacy and security
-
Updated
Apr 2, 2022 - Java
infrastructure
golang
data
storage
ethereum
ipfs
swarm
pinning
i2p
temporal
ipns
ipfs-cluster
ethereum-swarm
-
Updated
Jan 13, 2021 - Go
docker
docker-compose
ipfs
distributed-computing
tor
distributed-storage
sia
boinc
kiwix
i2p
foldingathome
storj
pywb
internet-archiving
archivebox
good-karma
archivewarrior
zimfarm
-
Updated
Aug 4, 2021
Official repository of OnionCat, the VPN adapter for Tor and I2P.
-
Updated
Mar 21, 2022 - C
Denarius [$D] is a PoW/PoS Hybrid Cryptocurrency with Tribus a new PoW Hashing Algo built specifically for D, one of a kind hybrid masternodes called Fortuna Stakes, atomic swaps, staking, mining, IPFS, optional Native Tor and I2P, and much more!
crypto
bitcoin
ipfs
decentralized
blockchain
d
p2p
tor
cryptocurrency
i2p
blockchain-technology
altcoins
stake
satoshi
masternodes
atomic-swaps
denarius
tribus-pow
pos-hybrid
tribus-algorithm
-
Updated
Dec 16, 2021 - C
Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forces all traffic through the Tor network, has support for other networks such as I2P and is hardened a lot for security. All data is lost at shutdown as it is run from RAM.
-
Updated
Dec 7, 2020 - Shell
I2P router implementation in Rust
-
Updated
Mar 2, 2022 - Rust
A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
-
Updated
Dec 11, 2021
Library to enable decentralized web requests
-
Updated
Mar 29, 2022 - C++
i2pd for Android
-
Updated
Mar 30, 2022 - Java
enhancement
New feature or request
good first issue
Good for newcomers
help wanted
Extra attention is needed
GOST R 34.11-2012 algo, GOST R 34.10-2012 signature
-
Updated
Dec 19, 2021 - C++
eyedeekay
commented
Mar 3, 2020
When the proxy isn't ready, but the user enters an I2P browsing tab, provide a descriptive error page to guide the user to a solution, even if that solution is to tell them to wait 2 minutes.
States should be described:
- Router Not Present: There is no indication that I2P is installed on the system. Direct them to an I2P distribution.
- HTTP Proxy Not Ready: The router is present, but th
enhancement
New feature or request
good first issue
Good for newcomers
Next
Things I will probably work on after what I am working on now.
chat
security
cryptography
privacy
crypto
messenger
secure
private
anonymous
encrypted
im
i2p
i2pd
i2pchat
i2p-chat
i2p-messenger
i2pmessenger
i2pqtmessenger
i2p-qt-messenger
qti2pmessenger
-
Updated
Aug 25, 2021 - C++
Awesome resources - 网络资源
game
music
blog
design
programming
video
dribbble
proxy
forum
bookmarks
resources
vpn
software
entertainment
weather-api
api-service
i2p
gate
free-photos
-
Updated
Mar 4, 2022 - HTML
Improve this page
Add a description, image, and links to the i2p topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the i2p topic, visit your repo's landing page and select "manage topics."
If the user is using i2p-zero for I2P, chances are they don't have an I2CP port exposed, which we use to detect the presence of an I2P router before attempting to connect to SAM. That way if the router is present but SAM isn't enabled we can advise the user to enable it. So instead, we need to check for I2CP, then attempt to connect to SAM. That way we have 4 states. No I2CP or SAM, I2CP but not S