I2P Services | A Curated Guide to I2P I2P is for more than just drug markets. This is a list of services I2P has to offer. Tutorials All Add-ons Alternatives Darknets Messaging Other Articles About The Tin Hat I2P Services | A Curated Guide to I2P Category: else A 3 Minute Read 31 Jan 2015 Image By Daniel Rehn Lately, several articles have been published about I2P largely due to the Silk Road moving from Tor. Some of these articles have done a good job in covering I2P, others not so much. It seems that one of the hurdles that authors are having trouble with is understanding the idea that there is more to I2P than simply a drug market. Thus, here’s a list of various I2P services that aren’t drug markets, that may still be of interest. Many of the services have clear-net alternatives, the advantage being that on I2P your activities are anonymous and secure. Each link is a b32 address, meaning that you shouldn’t need an address book lookup, and should be able to go directly to the site. Also, some content on these websites is under copyright, and thus downloading it may be illegal in your area. I don’t publicly endorse piracy, and thus download them at your own discretion. I’m merely trying to convey the techno-geographical landscape of I2P for educational purposes. (i.e. don’t Barret Brown me). File Sharing Tracker2.postman.i2p This is one of the top sites on I2P. It features thousands of torrents which can be loaded up onto your torrent client for secure, anonymous file-sharing. Ebooks.i2p This has a fairly good library of ebooks that can be searched and downloaded. As of writing this there are 30898 books waiting to be downloaded. Tome.i2p Another ebook library which is currently being reorganized, yet still has hundreds, if not thousands of ebooks. Communication I2P-Bote This is a secure, distributed messaging platform similar to email, but superior in many ways. For more information read my tutorial . Email This is a much more typical email service that comes default on your I2P router. It also allows emails to be sent to the clear-net. IRC There’s no link for this one because you’ll need to use an IRC client. But I2P is home to some great discussions, and there’s some information on the I2P router console on how to set it up. Hosting Personal Website With I2P comes a built-in anonymous webserver. Here you can build your own website and host it for free, allowing anyone else on I2P access to it. Pastebin There’s not a lot to say on this one, except that it’s a simple pastebin which you can use anonymously. Id3nt.i2p I2P’s Twitter. It’s a microblogging platform which currently has over 1100 users. Git hosting Anonymous Git hosting for sharing source code. Forums Zzz.i2p A forum for discussion of I2P development. Tends to be fairly active as far as darknet forums go. Forum.i2p A more general discussion forum. This is a good place to go for general discussion, technical help, as well as development of I2P and related services. How-To/Wikis: Ugha.i2p A wiki with how-to guides on a variety of topics. A good place for both new and experienced users. Killyourtv.i2p This site has both tutorials, as well as a list of services which it provides. There’s everything here from how-to’s to Python documentation. Irongeeks.i2p Notes from Tor and I2P workshops, hosted by Adrian Crenshaw. There’s quite a bit of information here on installing and tweaking various aspects of both I2P and Tor. Privacyhawk.i2p More step-by-step tutorials. This includes some good guide on installing hardened Gentoo, configuring Thunderbird to access your I2P mail, signature verification in Windows, etc. It’s not pretty, but it’s quite useful. Secure.thetinhat.i2p Easily the best site on I2P (kidding of course). This is the I2P mirror of what you’re reading now. Includes tutorials and regular blog posts. Miscellaneous Eepcast.i2p If there was ever a right time to use the phrase Pirate Radio, this would be it. Underground 24/7 radio station streaming right to your PC through I2P. Keys.echelon.i2p A PGP key server where you can upload and download PGP keys. Not a lot to say here other than that its a good choice for anyone hoping to distribute their keys anonymously. Planet.i2p A feed aggregator for posts made on various I2P websites (except this one). Its a good place to discover content and keep up to date with the I2P community. Tahoe-Lafs This is a distributed, cryptographically secure file store that operates over the I2P network. Tahoe-LAFS is fairly complex, so I’d recommend you read their documentation , but know that most of the I2P community is a fan. The I2P version won’t be great for large files, but is perfect for small ones. Have more suggestions? Leave a comment down below. Want to upgrade your online privacy? I use NordVPN to encrypt my traffic and route it across the globe, and Spideroak for rock solid encrypted cloud storage! Share, Follow, & Comment Follow On Twitter Follow On Facebook Latest Posts Is Bitcoin Actually Private? 23 Jul 2017 A primer on privacy and Bitcoin, why it matters for fungibility, and what cryptocurrencies are trying to fix it. Slantwise Action | How WhatsApp, Signal, and Steemit Are Feeding the Resistance 14 Jul 2017 Can people meaningfully resist surveillance without knowing it? The Internet of Things Isn't Just About Networked Juicers | Privacy, Health, & Technology 26 May 2017 The privacy failings of the internet of things get worse when we realize its inevitable health applications But The Data Says So | Why Data Can't Exist in a Social Vacuum 19 May 2017 Some people still don't grasp that data can't be removed from society (and it's racist tendencies) Tahoe-LAFS Tutorial (Part 3) | Running a Storage Node on I2P 12 May 2017 Learn how to contribute to Tahoe-LAFS on I2P by running your own storage node! What is Ransomware and How Do I Protect Against It? 05 May 2017 Learn how ransomware is shutting down entire institutions, and how you can defend against it How Secure Is Email? 05 May 2017 A primer on email security. Learn where email is weak and how to make it stronger. Tahoe-LAFS Tutorial (Part 2) | Running Tahoe-LAFS on I2P 22 Apr 2017 Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial shows you how to run Tahoe-LAFS using I2P on Linux Tahoe-LAFS Tutorial (Part 1) | Decentralized Cloud Storage 07 Apr 2017 Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial is the first in a three part series that teaches you the basics of Tahoe-LAFS How Do I Start An Anonymous Blog? 31 Mar 2017 If you want to start an anonymous blog, there's a lot of considerations. This primer will point you to the tools and tips you need to get started. Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils 23 Mar 2017 American ISPs are now selling your data, and despite controversy, a VPN isn't necessarily a bad idea. 4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin) 17 Mar 2017 Brave is disrupting the entire online advertising model for the better. Learn what it can do for you. Is Tor Safe? | Assessing 5 Claims About Tor’s Security 09 Mar 2017 Is Tor funded by the US government? Can it be hacked? Can it be broken by mere statistics? This article unpacks those claims. ZeroNet | Introduction & Setup Tutorial 03 Mar 2017 Discover how ZeroNet could revolutionize Tor and I2P's hidden services, before learning how to install it yourself Why Location Privacy Matters 24 Feb 2017 Location data says a lot about us, with or without Stingrays at work. We need to take it more seriously. What is Device Fingerprinting? 17 Feb 2017 Learn what browser fingerprinting is and how it canb e used to track you online. How To Actually Torrent Privately & Anonymously For Free 09 Feb 2017 Learn the pros and cons of using a VPN to torrent, as well as how to use I2P to anonymously torrent for free! The Best VPN Kill Switch For Linux Using Easy Firewall Rules 03 Feb 2017 Learn how to protect against your VPN disconnecting using these simple Linux firewall rules Ledger Nano S Review | Why You Need a Bitcoin Hardware Wallet 25 Jan 2017 A review of the Ledger Nano S, and an explanation of why hardware wallets just make life better when using Bitcoin What is Two Factor Authentication (2FA) And Why Use It? 20 Jan 2017 What 2FA is, why you should use it, and why we need FIDO U2F. Support The Tin Hat on Patreon! 17 Jan 2017 The Tin Hat now has a few more ways to support the site. What is a hash? 15 Jan 2017 A simple explanation of what hashing is, and how hashes are used. Trump's Toolbox | Future Attribute Screening Technology 15 Nov 2016 FAST is a program that attempts to wirelessly detect whether youre a terrorist, and its in Trump's back pocket. uBlock Origin | The Best AdBlock Alternative 20 Feb 2016 For AdBlock (Plus) alternatives, look no further than uBlock Origin. This tutorial explains why, and how, you should use it. Contact Privacy Policy RSS Feed Support Me Hidden Services: Tor I2P