• Rocky Bytes News RSS Feed
  • Rocky Bytes in Facebook
  • Rocky Bytes Youtube Channel
  • Rocky Bytes in Twitter
  • Rocky Bytes in Google+
More than 50,000 Windows Programs downloaded every day!
I2P

0.9.17

"I2P is a computer network layer which purpose is to allow software to securely send messages to one another."

I2P Specifications

DOWNLOADFree (14.07 MB)
Safe Download for PC - Virus & Malware Free
License:
Free (GPL)
Developer:
Size:
14.07 MB
OS:
Windows XP / Windows Vista / Windows 7 / Windows 8
Rocky Bytes Score
I2P is Great!
Great!
Software Ranking
14th out of 16
Downloaded
638
Times
Pin It

I2P Review

A computer network layer which is used to allow software to send messages to one another securely, I2P is free and open source software that is published under multiple licenses and is managed by a group of dedicated developers to maintain the software. It's uses include anonymous sending and receiving of web surfing, chatting, blogging, and file transferring using secure protocol. 

The software has been in active development in beta stage since 2003 and has been maintained by a dedicated group of developers since the same time. They are dedicated in maintaining I2P, which is an anonymous network layer which is designed to allow other applications connect through it to increase security of the content that is being sent and received by the users. 

There are several applications that are included in I2P, such as I2PTunnel, which is an application embedded into I2P that allows applications to communicate over I2P through "tunnels". SAM (Simple Anonymous Messaging) which is a protocol that allows client applications to communicate over I2P using a socket-based interface to the I2P router. BOB (Basic Open Bridge) which is a less complex application to manage protocol similar to "SAM". Finally, Orchid, which is an outproxy Tor plugin for extra security

There are several file sharing opportunities through I2P for maximum security while downloading the content you want. You can connect to I2P torrents through the application, but they must only be I2P torrents using the I2P network. You can only access these specific torrents through the I2P network, which means this content is exclusive the I2P users. This ensures better security when downloading this content. 

There are many networking opportunties you can use I2P for to increase the security of the content you are sending and receiving. This content includes instant-messaging, publishing, and emailing. Which an extra network layer for security, I2P protects you and your content. 

DOWNLOAD NOW

Safe free download - Tested Virus and Malware Free

Warning: Invalid argument supplied for foreach() in /var/www/www.rockybytes.com/htdocs/Includes/Frame/Modules/program.php on line 159

I2P Related News Posts

Psiphon alternatives: more Censorship Circumvention Tools

Psiphon alternatives: more Censorship Circumvention Tools

If you’ve read our articles in the past, then you know we’re big fans of censorship circumvention tools such as Psiphon, Tor Browser, Ultrasurf and Hotspot Shield. But with the articles in the past few months, we’ve written all there is to


At the time of downloading I2P you accept the terms of use and privacy policy stated by Parsec Media S.L. The download will be handled by a 3rd party download manager that provides an easier and safer download and installation of I2P. Additionally, the download manager offers the optional installation of several safe and trusted 3rd party applications and browser plugins which you may choose to install or not during the download process.