Anonymity networks
I2P
I2P is the long-running peer to Tor for network-layer anonymity.
- Website
- geti2p.net
- KYC
- no KYC — Network-layer anonymity protocol; no accounts, no central authority. Identity is a self-generated destination address.
- Status
- active
- Fiat on-ramp
- no
- Payment
- donation
- Jurisdiction
- independent open source
- Founded
- 2003
- Open source
- yes
- Custodial
- no
- Last verified
- Sources
- 2
Overview
What I2P is#
A network-layer anonymity protocol using garlic routing. The default use case is reaching in-network destinations (eepsites); accessing clearnet through I2P requires an outproxy.
Threat-model fit#
When in-network hidden services are the primary use case, or as a second anonymity network alongside Tor.
Strengths
- Garlic routing — multiple messages bundled together, harder to correlate than Tor's onion routing.
- Designed for hidden-service-style use rather than exit-node traffic; outproxy is a separate concern.
- Active community development including i2pd (C++) and i2p+ (Java) implementations.
Caveats
- Smaller user base than Tor — the anonymity set is smaller.
- Mostly used for in-network destinations; clearnet access via outproxies is less polished than Tor.
- Network has historically had eepsite uptime variance.
Verdict
I2P is the long-running peer to Tor for network-layer anonymity. Different design (garlic routing, in-network destinations as the primary use case) and different threat model. Best fit when in-network anonymous services are the use case, or as a Tor-complement for users who specifically want both networks in their threat model.
FAQ
- Does I2P require KYC?
- As of May 12, 2026, I2P does not require KYC for normal use. Network-layer anonymity protocol; no accounts, no central authority. Identity is a self-generated destination address.
- What payment methods does I2P accept?
- I2P accepts: donation.
- Where is I2P based?
- Operating jurisdiction listed as independent open source. This is best-known information; corporate structure can be opaque.
Sources
- I2P documentation · accessed
- i2pd source · accessed
Mentioned in
Quick answers
Alternatives to I2P
Entry last verified . Notice an error? Send it via the contact form.