I2P - The Invisible Internet
Basic Information
- Name: I2P (Invisible Internet Project)
- Official Website: https://geti2p.net/
- Type: Decentralized Anonymous Network Layer
- License: Multiple Open Source Licenses
- Programming Language: Java (Core), C++ (i2pd Implementation)
- First Release: 2003
- Design Philosophy: Internal Network Services First (Not Proxy to the Internet)
Product Description
I2P is a decentralized anonymous communication network that uses "Garlic Routing" technology to bundle multiple encrypted messages together for transmission. Unlike Tor, which is primarily used for anonymous access to the regular internet, I2P focuses on anonymous communication within the network ("Invisible Internet"), including email, chat, file sharing, and website hosting.
Core Features/Characteristics
- Garlic Routing: An enhanced version of onion routing that bundles multiple encrypted messages into a single "garlic" container
- Unidirectional Tunnels: Separates inbound and outbound traffic, with each participant only seeing half of the communication flow
- No Central Directory: Uses a self-organizing Kademlia DHT instead of a centralized directory authority
- eepSites: Anonymous websites within the I2P network (.i2p domains)
- I2P Mail: Anonymous email system within the network
- I2P Torrent: Anonymous BitTorrent file sharing
- Private Leaseset (Added in 2026): Allows anonymous hosting of services without exposing IP addresses
- Floodfill Routers: Rotating network information distribution nodes
I2P vs Tor Core Differences
| Feature | I2P | Tor |
|---|---|---|
| Routing Method | Garlic Routing (Bundles Multiple Messages) | Onion Routing (Single Message) |
| Tunnel Direction | Unidirectional (Separate Inbound/Outbound) | Bidirectional (Request and Response Same Path) |
| Network Topology | Decentralized DHT | 9 Directory Authority Servers |
| Primary Use | Internal Network Services | Anonymous Access to Regular Internet |
| Metadata Leakage | Less (Message Bundling) | More |
| Timing Attack Resistance | Stronger (Unidirectional Tunnels) | Weaker (Bidirectional Circuits) |
Technical Architecture
- Transport: UDP-based SSU2 and TCP-based NTCP2
- Encryption: Each tunnel layer independently encrypted
- Tunnels: Unidirectional encrypted channels composed of multiple routers
- DHT: Kademlia Distributed Hash Table manages network information
- Database: NetDB stores router information and Leasesets
Use Cases
- Anonymous Email Communication
- Anonymous File Sharing (BitTorrent)
- Anonymous Website Hosting (eepSites)
- IRC Chat
- Anonymous Blogs and Forums
Business Model
- Completely Free and Open Source
- Developed and Maintained by Community Volunteers
- Sustained by Donations
Limitations
- Generally not directly used for accessing the regular internet (Not Designed for This Purpose)
- User Base Much Smaller Than Tor
- Initial Connection Takes Time to Establish Tunnels
- Interface and Configuration Not User-Friendly for Beginners
- Smaller Application Ecosystem Compared to Tor
Relationship with OpenClaw
I2P can serve as the extreme anonymous communication layer for OpenClaw. For scenarios requiring the highest level of anonymity, OpenClaw can communicate internally via the I2P network, avoiding any metadata leakage.