9 downloads (last 7 days)
Powerful encryption for data sharing
Review by Karen M.
Pros
Cons
For this reason the best is to install a program that gives us the chance to encrypt data transfers. Just as I2P do. It can be complex, but to begin you only will need to install it.
I2P will encrypt information flowing between computers, with a similar performance as Freenet or Tor network. I2P's encryption is achieved trough remote Internet connections, one of the safest ways to protect secret information.
I2P is not difficult to use, and the security level that you will achieve worth it. His interface can be opened form any web browser to operate from anywhere, so you will hide your communications efficiently.
With I2P you will connect to local networks and Internet through remote servers, in a faster way that if you use Tor networks. Is it 100% safe? No, but it can be one of the safest ways to connect computers and to allow sharing data with a plus in safety.
Ratings about I2P
Very good
1 votes
1 review by registered users
(oculto)
198
68
Not for all audiences
12 years and 8 months ago
Internet connection with this kind of tools I found it safer, however, to learn to use is somewhat cumbersome. Its configuration is difficult and not always when installing is done in three steps. Nothing that can not be solved with a little reading through the tutorials found on Internet connections to Tor. The form of connection is made through servers even after each connects itself can be a web server.
Requirements
Additional details
Size
22.17 MB
Latest version
1.9.0
Language
English
Total Downloads
3,458
Works with
Windows 7, 8, 8.1, 10, 11
Date
1 year and 7 months ago
Developer
I2PSecurity analysis
Dangerous
Alternatives to I2P
Tool to create dynamic diagramms in 3D with access to the computers form the same diagrams.
A fast analysis providing all the information about your network and adaptors.