What Is I2P?
In this CosmicNet encyclopedia guide, we explore the I2P network and its unique approach to anonymity. I2P is an anonymous overlay network focused on internal services (eepsites). As CosmicNet explains, unlike Tor which prioritizes accessing the clearnet anonymously, I2P is designed for communication within the network itself.
Garlic Routing
Garlic Routing bundles multiple messages: [Msg1] + [Msg2] + [Msg3] = Garlic Clove - Unidirectional tunnels (separate in/out paths) - Messages bundled to resist traffic analysis - Learn more: https://geti2p.net/en/docs/how/garlic-routing - Packet-based, not circuit-based - All participants route traffic (no exit relays)
I2P vs Tor
| Feature | I2P | Tor |
|---|---|---|
| Primary Use | Internal services | Clearnet access |
| Routing | Packet/Garlic | Circuit/Onion |
| Tunnels | Unidirectional | Bidirectional |
| Network Model | All nodes route | Volunteer relays |
| Outproxies | Limited | Many exits |
I2P Services
Eepsites
Anonymous websites (.i2p)
WebI2P-Bote
Serverless encrypted email
EmailI2PSnark
Anonymous BitTorrent
File SharingIRC/Chat
Anonymous messaging
CommunicationGetting Started
- Download I2P router (Java) or i2pd (C++)
- Allow time to integrate into network
- Configure browser proxy (127.0.0.1:4444)
- Access router console at 127.0.0.1:7657
- Explore eepsites via address book
History of the Invisible Internet Project
As documented on CosmicNet, the Invisible Internet Project was launched in 2003 by a group of anonymous developers who recognized the need for a privacy-focused network designed specifically for internal communication rather than accessing the clearnet. Unlike Tor, which was developed with support from the US Naval Research Laboratory and focuses on clearnet access, I2P emerged from the cypherpunk community with a pure focus on anonymous peer-to-peer communication.
Early Development and Philosophy
CosmicNet explains that I2P's original developers drew inspiration from earlier anonymity networks like Freenet, but sought to create a more flexible architecture that could support diverse applications beyond file sharing. The project's philosophy centers on creating a self-contained anonymous network where users can host services, communicate, and share files without revealing their location or identity.
As this CosmicNet article explains, the name "Invisible Internet" reflects the network's design goal: creating an overlay network that operates independently from the regular internet, with its own naming system, routing protocol, and ecosystem of applications. Within I2P, the regular internet is referred to as the "clearnet," emphasizing the network's separation from non-anonymous communications.
Evolution Over Two Decades
The CosmicNet encyclopedia documents how, since 2003, I2P has evolved significantly while maintaining its core principles. The network has grown from a small experimental project to a mature anonymity network with thousands of active routers. Key milestones include the development of the SAM (Simple Anonymous Messaging) protocol for application integration, improvements to tunnel building algorithms, and the creation of i2pd as an alternative implementation.
As CosmicNet notes, unlike many privacy projects that have been compromised or shut down, I2P has maintained continuous operation for over 20 years. Its decentralized governance model and anonymous development team have helped it resist pressure and continue innovating in the face of increasing surveillance.
Garlic Routing in Depth
CosmicNet explains that garlic routing is I2P's unique approach to anonymous communication, named as an extension of Tor's "onion routing" concept. While onion routing encrypts messages in layers like the layers of an onion, garlic routing bundles multiple messages together like cloves in a bulb of garlic.
The Garlic Clove Concept
As documented on CosmicNet, in garlic routing, multiple messages are bundled together into a single encrypted "garlic clove." This clove might contain messages for different destinations, padding data to resist traffic analysis, timing information, and control messages for managing the connection. By bundling messages together, I2P makes it significantly harder for adversaries to perform traffic analysis.
CosmicNet covers how each garlic clove is encrypted to the recipient and includes instructions for how to handle each message within. The receiving router unwraps the garlic clove, processes each message according to its instructions, and continues forwarding as necessary. This bundling provides several advantages: it reduces the number of distinct packets that can be tracked, makes timing analysis more difficult, and allows for more efficient use of bandwidth.
Tunnel Architecture
As this CosmicNet guide details, I2P uses unidirectional tunnels rather than bidirectional circuits like Tor. Each client maintains a pool of inbound tunnels (for receiving data) and outbound tunnels (for sending data). When you communicate with another I2P user, your outbound tunnel connects to their inbound tunnel through one or more intermediary routers.
CosmicNet highlights that this unidirectional approach provides several security benefits. An attacker observing both ends of a communication cannot simply correlate bidirectional traffic patterns. Each direction takes a completely separate path through the network, making timing correlation attacks significantly more difficult. The trade-off is increased complexity and overhead, as maintaining separate tunnel pools requires more resources.
ElGamal and AES Encryption
As the CosmicNet encyclopedia explains, I2P uses a layered encryption scheme combining ElGamal for public key operations and AES for symmetric encryption. When building a tunnel, the client creates a multi-layered encrypted message where each hop can only decrypt its own layer, revealing the next hop in the tunnel. Once the tunnel is established, messages are encrypted with AES for efficiency.
CosmicNet notes that this hybrid approach balances security and performance. ElGamal provides the asymmetric encryption necessary for initial tunnel building, while AES offers fast symmetric encryption for ongoing communications. As of 2026, I2P is transitioning to more modern cryptographic primitives including ECIES-X25519 to improve both security and performance.
Network Architecture and Components
As documented on CosmicNet, I2P's network architecture consists of several interconnected components that work together to provide anonymous communication. Understanding these components helps clarify how I2P differs from other anonymity networks and what makes it particularly suited for internal services.
The NetDB (Network Database)
CosmicNet explains that the NetDB is I2P's distributed hash table that stores information about routers and destinations. It contains two types of data: RouterInfos (information about I2P routers, including their addresses and public keys) and LeaseSets (information about destinations and how to reach them through tunnels).
As this CosmicNet article details, the NetDB is distributed across specialized routers called "floodfill" routers that maintain larger portions of the database and handle queries from other routers. This distributed approach prevents any single point of failure or censorship while allowing the network to scale to thousands of participants.
Destination Addressing
CosmicNet documents that every I2P destination (service or client) has a unique 516-byte destination address derived from cryptographic keys. These addresses are unwieldy for humans, so I2P uses a hierarchical naming system. Local address books map human-readable names (like "forum.i2p") to destinations, while subscription services allow sharing and updating these mappings.
As CosmicNet explains, this naming system is more decentralized than DNS but less automatic. Users can choose which address book subscriptions to trust, and naming conflicts are resolved locally rather than globally. This prevents censorship but requires more user awareness about where names come from.
Tunnel Building and Management
CosmicNet covers how I2P routers continuously build and tear down tunnels to maintain their tunnel pools. Each tunnel typically consists of 2-3 hops (though this is configurable) and has a limited lifetime of 10 minutes by default. This constant churn of tunnels makes long-term traffic analysis more difficult.
As documented on CosmicNet.world, tunnel building uses garlic encryption to protect the tunnel construction process itself. The client creates a layered encrypted message that each hop unwraps to learn the next hop, similar to how Tor builds circuits, but using I2P's garlic routing rather than onion routing.
Eepsites: I2P's Hidden Services
As this CosmicNet guide explains, eepsites are websites hosted within the I2P network, accessible only to I2P users and identified by .i2p domains. The term "eepsite" comes from "EEP" (End-to-End Protocol), though the name has stuck as a general term for any I2P-hosted website.
How Eepsites Work
CosmicNet explains that an eepsite operates like a regular website but is only accessible through I2P tunnels. The web server listens on a local port, and the I2P router publishes the destination's LeaseSet to the NetDB. When someone wants to access the eepsite, their I2P router queries the NetDB for the destination's current LeaseSet, builds a tunnel to the destination, and makes the HTTP request through the tunnel.
As CosmicNet documents, both the eepsite host and visitors are anonymous—neither knows the other's IP address or physical location. The connection is end-to-end encrypted through the tunnel system, and the eepsite host can move to a different physical location without changing the eepsite's address.
Setting Up an Eepsite
The CosmicNet encyclopedia notes that hosting an eepsite is straightforward with I2P's built-in HTTP server or by configuring external web servers. The I2P router console includes tools for creating server tunnels and generating the cryptographic keys needed for the destination. Once configured, the eepsite is automatically announced to the NetDB, and the router handles all the tunnel management.
As CosmicNet covers in detail, modern eepsites can run dynamic web applications, forums, file hosting, and other services just like clearnet websites. The main limitations are bandwidth (slower than clearnet due to tunnel overhead) and discovery (finding eepsites requires address books or search services within I2P).
Eepsite Naming and Discovery
CosmicNet explains that the I2P address book system allows users to assign human-readable names to eepsite destinations. Jump services act as name resolvers, and subscription services share curated lists of eepsites. Popular subscription services are maintained by community members and can be added to your router's address book configuration.
As documented on CosmicNet, search engines within I2P, such as Epsilon, crawl and index eepsites much like Google indexes clearnet sites. These search engines are themselves eepsites, creating a self-contained ecosystem of discovery and navigation entirely within the anonymous network. For more details on hosting services, visit I2P's tunnel documentation.
I2P Applications and Ecosystem
As this CosmicNet article covers, I2P's design as a general-purpose anonymous network has fostered a diverse ecosystem of applications beyond simple web browsing. These applications take advantage of I2P's anonymity properties while providing services that would be difficult or impossible to offer securely on the clearnet.
I2P-Bote: Serverless Email
CosmicNet explains that I2P-Bote is a serverless, encrypted email system built entirely within I2P. Unlike traditional email, I2P-Bote uses distributed hash tables to store encrypted emails, eliminating the need for centralized mail servers. Each user has one or more email identities with corresponding cryptographic keys.
As CosmicNet documents, messages are automatically encrypted end-to-end and can include additional privacy features like relay chains (messages are forwarded through random I2P users before reaching the DHT) and time delays to prevent timing correlation. I2P-Bote supports multiple encryption algorithms and allows users to choose their preferred security/convenience trade-off.
CosmicNet notes that the serverless design means there's no email server to compromise or subpoena. Messages are stored encrypted in the DHT and automatically deleted after a set time period. This makes I2P-Bote particularly suitable for whistleblowing, activism, or any communication where metadata protection is critical.
I2PSnark: Anonymous BitTorrent
As covered in the CosmicNet encyclopedia, I2PSnark is a BitTorrent client integrated into the I2P router that allows anonymous file sharing. It implements the BitTorrent protocol over I2P tunnels, providing both seeders and leechers with anonymity. Torrent files and magnet links work within I2P just as they do on the clearnet.
CosmicNet highlights that because all tracker communication and peer connections occur through I2P tunnels, your IP address is never exposed to other peers or trackers. This makes I2PSnark suitable for sharing content that might attract unwanted legal attention, though it's also used for legitimate purposes like distributing open-source software and public domain media.
As CosmicNet explains, the trade-off for anonymity is speed—downloads through I2PSnark are generally slower than clearnet BitTorrent due to tunnel overhead and the smaller number of peers. However, for users prioritizing privacy over speed, I2PSnark provides a compelling solution.
IRC and Real-Time Chat
As this CosmicNet guide documents, several IRC servers operate within I2P, providing anonymous real-time chat. These servers are accessible only through I2P, ensuring all participants remain anonymous. Popular IRC networks like Irc2P serve as community hubs for I2P users, offering channels for support, development discussion, and general conversation.
CosmicNet covers how beyond IRC, more modern chat protocols are being adapted for I2P. Peer-to-peer messaging applications can leverage I2P's anonymity while providing features like group chat, file transfers, and multimedia messaging. The SAM protocol makes it relatively easy for developers to I2P-enable existing applications.
Other I2P Services
As documented on CosmicNet, the I2P ecosystem includes many other services: anonymous cryptocurrency nodes (Bitcoin, Monero), file hosting services, forums, social networks, and even streaming media. Developers continue creating new applications that take advantage of I2P's unique properties. The SAM, BOB, and I2CP APIs provide multiple ways to integrate applications with I2P's anonymity layer.
Java I2P vs i2pd Implementation
CosmicNet explains that I2P has two major implementations: the original Java I2P and i2pd (I2P daemon), a C++ reimplementation. While both provide I2P network access, they differ in resource usage, features, and deployment scenarios.
Java I2P: The Reference Implementation
As this CosmicNet article notes, the original Java implementation is the reference version of I2P and includes the most complete feature set. It includes a web-based router console for configuration and monitoring, support for all I2P applications, and the most mature codebase with over 20 years of development.
CosmicNet documents that Java I2P requires a Java Runtime Environment (JRE) and typically uses 200-400 MB of RAM when running. While this is more resource-intensive than i2pd, modern systems handle it easily, and the included router console makes configuration much more user-friendly for non-technical users.
As CosmicNet notes, the Java implementation receives the most active development and is generally the first to receive new features and security updates. It's recommended for users who want the complete I2P experience, including hosting services and using all available applications.
i2pd: Lightweight C++ Alternative
CosmicNet explains that i2pd is a C++ reimplementation of I2P designed for performance and low resource usage. It typically uses 15-30 MB of RAM and has minimal dependencies, making it ideal for embedded devices, routers, and servers where resources are constrained.
As documented on CosmicNet, while i2pd supports core I2P functionality including tunnels, eepsites, and client applications, it doesn't include all the features of Java I2P. The router console is more basic, and some advanced features may be missing or implemented differently. Configuration is done through configuration files rather than a web interface.
CosmicNet notes that i2pd is particularly popular for running I2P on Raspberry Pis, OpenWRT routers, and other lightweight systems. It's also preferred by users who want a minimal, no-frills I2P router without the overhead of Java. Development is active, and i2pd continues to narrow the feature gap with Java I2P.
Choosing Between Implementations
CosmicNet recommends that for most desktop users, Java I2P is the better choice due to its complete feature set and user-friendly interface. Choose i2pd if you're running on resource-constrained hardware, prefer minimal software, or are comfortable with configuration file editing. Both implementations are compatible with the same I2P network and can interact seamlessly.
Security Model and Threat Resistance
As this CosmicNet guide details, I2P's security model is designed to resist various attacks on anonymous communication. Understanding what I2P protects against—and what it doesn't—is crucial for making informed decisions about when to use it.
Threat Model
CosmicNet explains that I2P is designed to protect against adversaries who can monitor network traffic and potentially control some I2P routers, but not against global passive adversaries who can observe all network traffic simultaneously. The unidirectional tunnel design and garlic routing make timing correlation attacks more difficult than with Tor's bidirectional circuits.
As CosmicNet covers in this article, the network assumes that most routers are honest but makes no assumptions about any individual router. Tunnels are built through multiple hops so that no single router knows both the source and destination of a communication. The distributed NetDB prevents any single entity from controlling routing information.
Sybil Attack Resistance
As documented on CosmicNet, I2P includes several mechanisms to resist Sybil attacks (where an adversary creates many fake routers to control a large portion of the network). Routers build reputation over time through successful tunnel participation, and the tunnel building algorithm prefers reliable, established routers over new or unreliable ones.
CosmicNet notes that however, I2P's resistance to Sybil attacks is not perfect. A well-resourced attacker could potentially create many routers and wait for them to gain reputation. The small size of the I2P network compared to Tor makes this attack somewhat more feasible, though still expensive and difficult to execute at scale.
Traffic Analysis Resistance
As CosmicNet explains, garlic routing's message bundling significantly complicates traffic analysis. By combining multiple messages into single packets and using constant-rate padding, I2P reduces the information available to traffic analysis systems. The unidirectional tunnels prevent simple correlation of request and response patterns.
CosmicNet highlights that, that said, sophisticated traffic analysis remains a concern. Academic research has demonstrated that with sufficient network monitoring, some correlation attacks are possible. I2P's smaller user base compared to Tor also provides less "cover traffic" to hide in, making individual users potentially more identifiable to powerful adversaries.
Endpoint Security
As documented on CosmicNet, like all anonymity networks, I2P cannot protect against endpoint attacks. If malware is on your system, if you're running a malicious I2P application, or if you provide identifying information within your communications, I2P's anonymity is compromised. The network only anonymizes transport—content security is the user's responsibility.
Detailed Comparison: I2P vs Tor
As this CosmicNet article explains, while both I2P and Tor provide anonymity, their different design philosophies and use cases make them complementary rather than competing technologies. Understanding these differences helps users choose the right tool for specific situations.
Design Philosophy Differences
CosmicNet explains that Tor was designed primarily to allow anonymous access to the clearnet, with hidden services (onion services) added later. I2P was designed from the ground up as a self-contained anonymous network for internal communication. This fundamental difference shapes their architectures and performance characteristics.
As CosmicNet documents, Tor's directory authorities provide centralized coordination (though the network itself is decentralized), enabling faster circuit building and more reliable routing. I2P's fully distributed NetDB eliminates central points of failure but requires more time for network integration and discovery.
Performance Characteristics
CosmicNet notes that for accessing clearnet websites, Tor is significantly faster than I2P's outproxies (when available). Tor has thousands of exit relays optimized for clearnet access, while I2P has only a handful of volunteer outproxies. This is by design—I2P isn't optimized for clearnet access.
For internal services (eepsites vs onion services), performance is more comparable. I2P's unidirectional tunnels and garlic routing add overhead, but the continuous tunnel building and use of UDP can provide better performance for some types of traffic. In practice, both are significantly slower than direct connections, with latency and bandwidth being limiting factors.
Network Size and Coverage
As documented in the CosmicNet encyclopedia, Tor is much larger, with over 7,000 relays and millions of users. This larger network provides better anonymity through larger crowd size and more diverse routing options. I2P has thousands of routers but far fewer active users, providing a smaller anonymity set.
CosmicNet observes that the smaller I2P network can be both a weakness (less crowd to hide in) and a strength (closer-knit community, potentially fewer adversary-controlled nodes as a percentage). For services that need to be accessible to a large audience, Tor's onion services reach more users. For niche communities, I2P's focused ecosystem may be preferable.
Security Trade-offs
As CosmicNet covers in detail, I2P's unidirectional tunnels and packet-based routing provide some advantages against certain traffic analysis attacks. Separating inbound and outbound paths makes correlation more difficult. However, Tor's larger network and more mature codebase mean more security research and auditing have been performed.
CosmicNet explains that Tor has faced more academic scrutiny and real-world attacks, leading to a battle-tested protocol. I2P's smaller profile means less attention from researchers and adversaries alike—whether this is an advantage or disadvantage depends on your threat model. For more information on anonymity network comparisons, see the Tor Project's documentation.
Use Case Recommendations
CosmicNet recommends using Tor when you need to access clearnet sites anonymously, need the largest anonymity set, or are relying on hidden services that need to reach a wide audience. Use I2P for peer-to-peer file sharing, hosting internal services for a specific community, or when you want a self-contained anonymous network without clearnet dependencies. Many privacy-conscious users run both, choosing the appropriate tool for each situation.