From 467f54596b29aec40df5f41993ba6ffcc9eed6ef Mon Sep 17 00:00:00 2001 From: idk <hankhill19580@gmail.com> Date: Thu, 26 Aug 2021 17:50:58 -0400 Subject: [PATCH] Add 20 year celebration blog post --- i2p2www/blog/2021/08/26/20-Years-of-I2P.rst | 101 ++++++++++++++++++++ 1 file changed, 101 insertions(+) create mode 100644 i2p2www/blog/2021/08/26/20-Years-of-I2P.rst diff --git a/i2p2www/blog/2021/08/26/20-Years-of-I2P.rst b/i2p2www/blog/2021/08/26/20-Years-of-I2P.rst new file mode 100644 index 000000000..08e548685 --- /dev/null +++ b/i2p2www/blog/2021/08/26/20-Years-of-I2P.rst @@ -0,0 +1,101 @@ +=========================================== +{% trans -%}I2P Celebrates it's 20th Year{%- endtrans %} +=========================================== + +.. meta:: + :author: idk + :date: 2021-08-26 + :category: general + :excerpt: {% trans %}I2P has been around for 20 years, let's take a look back{% endtrans %} + +{% trans -%} +20 Years of I2P +{%- endtrans %} +============================================ + +{% trans -%} +It's hard to believe, but I2P has been around for nearly 20 years! From it's +beginnging as a C project which provided anonymous access to IRC, we've had +hundreds of contributors, accepted checkins from dozens of coders, used 2 +main languages, 3 version control systems, experienced a migration of it's +crypography, and multiple soft-forks. There have been around 500 registered +sites on the Invisible Web, and countless unregistered I2P sites that were only +accessible via their cryptographic hostnames. +{%- endtrans %} + +{% trans -%} +Thanks to the participation of users like you, the network has grown from a tiny +group of power users to over 75,000 nodes operated from all over the world, +made of I2P routers bundled in perhaps dozens of applications. Today I2P is +available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and +many other systems. I2P can run on phones and even in SOHO routers(thanks to the +independent C++ implementation of the protocol, i2pd). +{%- endtrans %} + +{% trans -%} +A Routing Protocol with Flagship Applications +{%- endtrans %} +--------------------------------------------- + +{% trans -%} +Even before other anonymity projects were providing their own application +bundles, I2P was a tool for building applications that were configured for +anonymity. Over the years, we've leaned on this strength, by expanding our +API's to support more and more versatile applications. Today, we're still +developing new ways of building I2P into applications. +{%- endtrans %} + +{% trans -%} +Using the power of the Hidden Services Manager or the SAM API, developers of all +kinds of applications can empower their users with anonymity using I2P. Exciting +downstream projects like Monero's I2P-Zero have made it very easy for developers +to help their users get connected to I2P. Today, I2P helps provide anonymity to +dozens of applications including Bitcoin, IRC, email and multiple file-sharing +protocols. +{%- endtrans %} + +{% trans -%} +An Anonymous Network By Everyone, For Everyone +{%- endtrans %} +---------------------------------------------- + +{% trans -%} +I2P has always been a decentralized network, because it's obvious that providing +an anonymity network is an intrinsically collaborative process. To illustrate +with the the most extreme example, a single computer user cannot provide itself +with anonymity, nor can it be a useful network, by definiton. However, building +I2P in this fully-decentralized manner hasn't always been easy. +{%- endtrans %} + +{% trans -%} +From the beginning, I2P would need to be scalable, and be able to balance itself +so that high-bandwidth nodes wouldn't be able to easily take over the network. +Sybil attacks would leave the realm of academia and we would need to develop +new defenses against them. +{%- endtrans %} + +{% trans -%} +We've worked very hard to never compromise on this stance, and today every I2P +router helps participate in providing the network with bandwidth resources and +providing the users with anonymity. In doing so, we've learned incredible things +and produced a network which at times has seemed inconceivable. +{%- endtrans %} + +{% trans -%} +Celebrating I2P +{%- endtrans %} +--------------- + +{% trans -%} +Over the next 2 weeks, we've planned some blog posts where we'll explore the past, +present, and future of I2P, highlight applications and tools that build on +and enhance I2P, and showcase the best of our community. Check back here for +more in the coming days! +{%- endtrans %} + +* {% trans -%}Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero(from Monero){%- endtrans %} +* {% trans -%}Level-Up your I2P use with Encrypted LeaseSets{%- endtrans %} +* {% trans -%}The History of I2P{%- endtrans %} +* {% trans -%}Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for End-Users{%- endtrans %} +* {% trans -%}I2P's Usability Journey{%- endtrans %} +* {% trans -%}Building Bridges - Making Connections with Other Privacy Projects{%- endtrans %} -- GitLab