Overview
- Technical Introduction
- A Less-Technical Introduction
- Threat model and analysis
- Comparisons to other anonymous networks
- Protocol stack chart
- Papers on I2P
- Presentations, articles, tutorials, videos, and interviews
- Invisible Internet Project (I2P) Project Overview - August 28, 2003 (PDF)
Application-Layer Topics
- Application Development Overview and Guide
- Naming and Address Book
- Address Book Subscription Feed Commands
- Plugins Overview
- Plugin Specification
- Managed Clients
- Embedding the router in your application
- Bittorrent over I2P
- I2PControl Plugin API
- hostsdb.blockfile Format
- Configuration File Format
Application Layer API and Protocols
- I2PTunnel
- I2PTunnel Configuration
- SOCKS Proxy
- SAMv3 Protocol
- SAM Protocol (Deprecated)
- SAMv2 Protocol (Deprecated)
- BOB Protocol (Deprecated)
End-to-End Transport API and Protocols
Client-to-Router Interface API and Protocol
End-to-End Encryption
- ECIES-X25519-AEAD-Ratchet encryption for destinations
- Hybrid ECIES-X25519 encryption
- ECIES-X25519 encryption for routers
- ElGamal/AES+SessionTag encryption
- ElGamal and AES cryptography details
Network Database
- Network database overview, details, and threat analysis
- Cryptographic hashes
- Cryptographic signatures
- Red25519 signatures
- Router reseed specification
- Base32 Addresses for Encrypted Leasesets
Router Message Protocol
Tunnels
- Peer profiling and selection
- Tunnel routing overview
- Garlic routing and terminology
- Tunnel building and encryption
- ElGamal/AES for build request encryption
- ElGamal and AES cryptography details
- Tunnel building specification (ElGamal)
- Tunnel building specification (ECIES-X25519)
- Low-level tunnel message specification
- Unidirectional Tunnels
- Peer Profiling and Selection in the I2P Anonymous Network - 2009 (PDF)
Transport Layer
Other Router Topics
- Router software updates
- Router reseed specification
- Performance
- Configuration File Format
- GeoIP File Format
- Ports used by I2P