Tired of platform decay? Build on the I2P network. Decentralized, encrypted, and keeping people connected in restrictive regions. https://geti2p.net/en/docs/api/samv3
@iuvi I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer make it difficult to identify I2P traffic:
Random port selection
Point-to-Point Encryption of all traffic
DH key exchange with no protocol bytes or other unencrypted constant fields
Simultaneous use of both TCP and UDP transports. UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track
@iuvi Your welcome! The thing to remember about I2P is that its privacy/ traffic protection function is within the I2P network. It was not built to interact with the clearnet / access sites outside of the I2P network. It has outproxy compatibility for that, but it operated by a third party.