Exploring the I2P Darknet: What You Can Find in the Anonymous Network

Exploring the I2P Darknet: What You Can Find in the Anonymous Network

I2P, or the Invisible Internet Project, is currently one of the most anonymous networks available. Here, you can browse websites and use services without revealing a single byte of your information to outsiders. Although I2P was launched back in 2003, the network continues to grow and expand. Let’s take a look at what interesting things you can find on I2P today.

How I2P Works

I2P is built as an overlay network, meaning its anonymous and secure layer operates on top of the regular internet. One of I2P’s main features is its decentralization. There are no DNS servers; instead, “address books” are automatically updated. Cryptographic keys serve as addresses, which do not reveal the real computers behind them. Every user can get their own key, which is impossible to trace.

Many users wonder why use I2P when there are VPNs and Tor. Here are some key differences between I2P and the Tor browser:

  • Tor uses “onion” routing, sending your traffic through several proxies, but doesn’t inherently protect against decryption. I2P, on the other hand, relies on traffic encryption.
  • Tor prefers SOCKS, while I2P uses its own API. Which is more convenient is up to you.
  • I2P tunnels are unidirectional, unlike Tor’s.
  • Tor, while having some peer-to-peer features, is still centralized. I2P is fully decentralized.

These are just the main differences. Even from this, it’s clear that I2P is a more secure and anonymous option. Compared to VPNs, I2P’s reliability doesn’t depend on a provider or hoster.

If you want to learn more about how I2P works, check out the article “Revealing the Secrets of the I2P Network.” For now, let’s skip the technical details and get ready for our journey.

Getting Started with I2P

Like Tor, you can’t access I2P resources without extra software. But while Tor is as simple as downloading a browser, I2P setup is a bit more involved. Here’s what you’ll need:

  • Java. Download the Windows version here and install it.
  • The official installer from the I2P website. Choose the version for your system and install it. There’s even an Android version.
  • If you’re on Windows, go to “Start → All Programs → I2P” and select “Start I2P (no window).” On Linux, you probably know what to do.
  • Open your browser (e.g., Firefox), go to “Settings → Advanced → Network → Use proxy,” and fill in the fields as shown in the screenshot.

If the I2P console page doesn’t open automatically, go to http://127.0.0.1:7657/home.

Now you’re ready to explore I2P. You can also add automatic loading of personal link libraries to make navigation easier. Optionally, you can go to the “Traffic” section and set the share of transit traffic to 100% and increase the upload/download speed to the maximum. This can help reduce network response time.

That’s it—come on in, make yourself at home! Just remember, don’t leave any traces behind.

What’s Inside I2P?

The I2P world isn’t as rich as Tor’s onion space, but with some searching, you can find plenty of useful, scary, and just plain interesting things.

Blogs, Boards, and Forums

The first place to visit is the Hidden Answers forum. Onion fans will find it familiar. People ask all sorts of questions—from “Who’s your favorite YouTuber?” to “How to get an abortion?” Answers come from regular users. There’s also a Russian-language equivalent called SecretChat.

Many I2P users run their own blogs, sharing information and thoughts—often on topics considered risky in the clearnet. There are also odd sites, like rebel.i2p, which just displays random, meaningless images. Of course, there are adult sites, but nothing new if you’re really an adult.

For a useful blog, check out Exotic Security by Michael van Delft, where he shares secrets of exotic online security and tips for programmers, like MacBook reflashing and more.

Every underground network needs its own board. I2P has F*ck Society, with sections on various topics, including a Runion section, threads on banned substances, violence, politics, and other classic darknet themes.

Another anonymous social network is Onelon, a “Facebook” without restrictions: say anything, to anyone, for any reason. The I2P version is similar to the onion version, though the latter is more popular.

Communication

Useful I2P services include vPass (for generating passwords for specific domains) and EasyGPG (for creating a personal GPG key). Most practical I2P resources can also be found on .onion or even in the clearnet. For example, Jabber servers like Echelon and decentralized anonymous email like I2P Bote are available, though they may only surprise total newcomers.

Marketplaces

I2P has its own markets. Where Onion has Hydra, I2P has nvspc. Payment and delivery systems are similar, and both are accessible from the clearnet. nvspc can also act as a cryptocurrency exchange. There’s also Garden, a marketplace similar to WayAway on .onion.

For art, there’s StreamRadio and “Radio Anonymous,” though the need for anonymized music is debatable.

Directories

I2P has its own Russian I2P Wiki, aimed at developing the I2P project by letting users anonymously edit articles, similar to the popular “Lurk.” There’s also a page with links to interesting resources. Don’t forget about Eepsites—a link directory, though unfortunately, most links are dead.

Book Libraries

Flibusta is also on I2P and works well. Besides massive libraries, I2P offers niche ones. For example, “Extreme Chemistry” collects guides for experiments you probably shouldn’t try at home. “World of Fantasy” is a specialized library for fantasy lovers.

File Sharing

I2P has tons of file-sharing sites. Where else can you exchange files as safely and anonymously? Maybe only in real life—and even that’s questionable. I2P includes the well-known “Skhoronil” and many underground sites like Serien. There are also torrent mirrors like RuTor and Public Torrent Tracker, and even a mirror of the “Orthodox Torrent.”

Crime

While the clearnet and .onion are full of hacker and carding forums, scammers, and fraudsters, I2P is much quieter. Even the biggest onion criminal sites rarely move to I2P, preferring easier access for users. Hardcore criminal resources do exist on I2P, but they’re hard to find. For example, Armada offers DDoS, hacking, and similar services, though the creators claim it’s all a bluff or a joke—we didn’t check. Other hacker sites, like Project Mayhem and the French BumpTeam, seem more like student projects than real criminal hubs. We couldn’t find many other crime-focused resources on I2P.

Cryptocurrency

I2P has a better relationship with crypto than with other things. For example, Zcash is available, along with many wallets and trading platforms. We haven’t used any of them, so think carefully before making crypto transactions on I2P. There’s even a site that lets you withdraw Bitcoin to a virtual VISA card (currently unavailable, but the idea is interesting).

Other Resources

Many I2P resources are also accessible from the clearnet, like a Telegram proxy list or RosPravosudie. To wrap up, don’t forget the official I2P Project website.

Conclusion

Using I2P isn’t easy, which is why it’s less popular than Tor. I2P offers a more sophisticated anonymization mechanism but can’t boast a wealth of content. For now, I2P is more about anonymous data transfer and hiding traffic than browsing sites. In this regard, it’s at least as good as, if not better than, Tor or VPNs.

The existence of a decentralized, uncontrolled network is important, even if you personally don’t find anything valuable there. So let’s thank those who keep I2P running, and check back in a couple of years to see how it’s grown.

Leave a Reply