Have you updated to the latest? I2P 2.5.1 addresses the Denial-of-Service Attacks affecting the I2P network and adds adjustments that improve RouterInfo validation and peer selection : https://geti2p.net/en/blog/post/2024/05/06/i2p_2.5.1_released
With this release, we have disabled the IP-based parts of the Sybil attack detection tool which were targeted to amplify the effect and duration of the attack. This should help the network return to normal operation.
A denial-of-service (DoS) is an attack that attempts to disrupt the normal function of traffic on a network or server. When successful, it leads to traffic congestion and the inability to reach servers or services. A Sybil attack is characterized by an attacker using spam on a network with nodes so that it can subvert a network's reputation system.
Looking for end-to-end encryption, traffic obfuscation, location obfuscation, and anonymity for your digital communications? I2P has you covered: https://geti2p.net
."..messaging and other encrypted services have become people’s memories, their casual hallway chats, their intimate whispers." We all need to fight against access to encrypted communications: https://www.mnot.net/blog/2024/04/29/power
The I2P network includes a plugin architecture to support both easy development and installation of new plugins. - Easy distribution. -Cryptographically signed and verified applications. -Automatic updates of applications. 👉 https://geti2p.net/en/docs/plugins
Similar to the network attacks in 2023. The Core Java distribution is handing it well, but expect some stormy weather on the network ahead of mitigations.
I2P network reliability is currently degraded due to a novel and persistent attack. Please be patient as we work on mitigations. If you have not yet updated to our latest release 2.5.0, please do so as it provides some defenses.
DIVA Blockchain is a fully anonymous, lightweight, low-energy and permissionless blockchain. The peers in the network communicate over #I2P. The chain gets built by communication instead of computation. https://github.com/diva-exchange/divachain
I2P is a fully distributed, autonomous, scalable, anonymous, resilient and secure network. https://geti2p.net/spec/i2np I2P has an application layer for file sharing, messaging, publishing, or other communication applications. 💫✨ https://geti2p.net/en/docs/api/samv3
The I2P Network Protocol is a router-to-router protocol used for network database lookups and replies, for creating tunnels, and for encrypted router and client data messages. Tunnels run in parallel, increasing resilience and balancing load on the network https://geti2p.net/en/docs/tunnels/implementation
Research suggests that OpenVPN-based services can be effectively blocked with little collateral damage by governments attempting to restrict VPN access by identifying connections using “dual use” DPI technology: https://arxiv.org/pdf/2403.03998.pdf