Tired of platform decay? Build on the I2P network. Decentralized, encrypted, and keeping people connected in restrictive regions. https://geti2p.net/en/docs/api/samv3
@i2p can i hide my usage of i2p from provider? Any "bridges" like in Tor? Thanks
@iuvi I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer make it difficult to identify I2P traffic:
Random port selection
Point-to-Point Encryption of all traffic
DH key exchange with no protocol bytes or other unencrypted constant fields
Simultaneous use of both TCP and UDP transports. UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track
@i2p Thanks for your answer!
@iuvi Your welcome! The thing to remember about I2P is that its privacy/ traffic protection function is within the I2P network. It was not built to interact with the clearnet / access sites outside of the I2P network. It has outproxy compatibility for that, but it operated by a third party.