I2P - The Invisible Internet

Decentralized Anonymous Network Layer I Applications & Practices

Basic Information

  • Name: I2P (Invisible Internet Project)
  • Official Website: https://geti2p.net/
  • Type: Decentralized Anonymous Network Layer
  • License: Multiple Open Source Licenses
  • Programming Language: Java (Core), C++ (i2pd Implementation)
  • First Release: 2003
  • Design Philosophy: Internal Network Services First (Not Proxy to the Internet)

Product Description

I2P is a decentralized anonymous communication network that uses "Garlic Routing" technology to bundle multiple encrypted messages together for transmission. Unlike Tor, which is primarily used for anonymous access to the regular internet, I2P focuses on anonymous communication within the network ("Invisible Internet"), including email, chat, file sharing, and website hosting.

Core Features/Characteristics

  • Garlic Routing: An enhanced version of onion routing that bundles multiple encrypted messages into a single "garlic" container
  • Unidirectional Tunnels: Separates inbound and outbound traffic, with each participant only seeing half of the communication flow
  • No Central Directory: Uses a self-organizing Kademlia DHT instead of a centralized directory authority
  • eepSites: Anonymous websites within the I2P network (.i2p domains)
  • I2P Mail: Anonymous email system within the network
  • I2P Torrent: Anonymous BitTorrent file sharing
  • Private Leaseset (Added in 2026): Allows anonymous hosting of services without exposing IP addresses
  • Floodfill Routers: Rotating network information distribution nodes

I2P vs Tor Core Differences

FeatureI2PTor
Routing MethodGarlic Routing (Bundles Multiple Messages)Onion Routing (Single Message)
Tunnel DirectionUnidirectional (Separate Inbound/Outbound)Bidirectional (Request and Response Same Path)
Network TopologyDecentralized DHT9 Directory Authority Servers
Primary UseInternal Network ServicesAnonymous Access to Regular Internet
Metadata LeakageLess (Message Bundling)More
Timing Attack ResistanceStronger (Unidirectional Tunnels)Weaker (Bidirectional Circuits)

Technical Architecture

  • Transport: UDP-based SSU2 and TCP-based NTCP2
  • Encryption: Each tunnel layer independently encrypted
  • Tunnels: Unidirectional encrypted channels composed of multiple routers
  • DHT: Kademlia Distributed Hash Table manages network information
  • Database: NetDB stores router information and Leasesets

Use Cases

  • Anonymous Email Communication
  • Anonymous File Sharing (BitTorrent)
  • Anonymous Website Hosting (eepSites)
  • IRC Chat
  • Anonymous Blogs and Forums

Business Model

  • Completely Free and Open Source
  • Developed and Maintained by Community Volunteers
  • Sustained by Donations

Limitations

  • Generally not directly used for accessing the regular internet (Not Designed for This Purpose)
  • User Base Much Smaller Than Tor
  • Initial Connection Takes Time to Establish Tunnels
  • Interface and Configuration Not User-Friendly for Beginners
  • Smaller Application Ecosystem Compared to Tor

Relationship with OpenClaw

I2P can serve as the extreme anonymous communication layer for OpenClaw. For scenarios requiring the highest level of anonymity, OpenClaw can communicate internally via the I2P network, avoiding any metadata leakage.

Sources