The Invisible Internet Project (I2P) - A Brief Explanation

Written by: Nearchos Nearchou



Time to read 2 min

I2P, also known as the “Invisible Internet Project”, is another widely used Dark Web technology. Every day people use this complex software to connect with the world without worrying about being tracked or their data being collected by third parties. I2P is a privacy-focus networking tool that allows peer-to-peer, censorship-resistant communications


Its traffic passes through a volunteer network of around 55,000 computers that are distributed around the world. All I2P traffic is internal and stays in the I2P network. Additionally, traffic inside I2P does not directly interact with the Internet, as it is a layer on top of the Internet. No one can see where the traffic is going, where it is coming from, or what the contents of the data packets are. 


The "Invisible Internet Project" makes use of a routing protocol that employs a network of proxy servers to build difficult-to-trace communication circuits. With this protocol, the proxy servers receive messages from numerous senders, shuffle them, and then deliver them back to the next recipient in random order. By severing the connection between the request's source and its destination, this method makes it more difficult for hackers and eavesdroppers to track end-to-end conversations


This type of protocol offers good security even if a hacker can see the full path, although it is not flawless. Advanced correlation attacks can be used by adversaries to identify the originator and recipient of data packets. The list below describes some of I2P’s main disadvantages.

  • Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.

  • Must-have logging: The I2P user interface must be logged in for users to access their material.

  • Severe vulnerabilities: Over 30,000 users were made vulnerable by a zero-day vulnerability that I2P experienced in 2014. Later, a 2017 study found that several more I2P flaws may also be exploited.

  • A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.

  • Less anonymity when browsing indexed sites: I2P does not ensure that users' browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.

Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. Finally, he is the author of the book “Combating Crime On The Dark Web”.

Leave a comment