![]() See the How-To / Tutorials in upstream documentation for more details, also for chat servers, XMPP / Jabber or RetroShare. I2pd has no built-in email client, filesharing or webserver for Eepsite. Open your browser of choice and visit the I2P welcome page at 127.0.0.1:7070 The configuration is made in /etc/i2pd/nf. Install the i2pd package for the daemon written in C++ which may suit hardware with limited resources or i2pd-git AUR for the development version. To make an eepsite, follow the I2P instructions, but keep in mind that the home directory will apply to the i2p user whose home directory is /opt/i2p as shown in the AUR i2p.install file. In order to visit eepsites configure your browser to use the local proxy: Open your browser of choice and visit the I2P welcome page at 127.0.0.1:7657 for the suite (see the FAQ).įrom here you can navigate to I2Ps configuration and statistics pages, and links to Eepsites.Īlso, be aware that eepsites are unavailable until the daemon has bootstrapped to the network, which can take several minutes. Start/enable rvice in case of i2p AUR, the pre-compiled binary illustrate the usage in INSTALL-headless.txt Such an installation will auto update through the i2p network with signed zip packages directly from the i2p developers. The I2P homepage also provides a pre-compiled binary which includes command line (headless) option and can be installed in the user's home directory. A recent Sun/Oracle Java or OpenJDK version with "mixed mode" support is recommended, "interpreted mode" could result in performance degradation, check with "java -version". The standard I2P suite is available with the i2p AUR and i2p-bin AUR packages. Does not require Java, is written in C++, consumes less memory and CPU. ![]() Most interactive and user-friendly Web-GUI interface and features, has a built-in client of email (SusiMail) and torrent (I2PSnark). Two implementations of I2P are as follows: ![]() Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |