2017 – Introduction to I2P & How to Install on Ubuntu Based Distros – January 5

2017 – Introduction to I2P & How to Install on Ubuntu Based Distros – January 5

Screen shots & this TEXT on Google Photos:


Press F11 to View in Full Screen.

The YouTube Video:

Next Video:
2017 – Introduction to P2P TV – Streaming Live TV Over P2P – January 6

How-to Install on Ubuntu Based Distros:

1- CTRL ALT T to open the Terminal & Copy-paste each Line at Time and press enter:

sudo apt-add-repository ppa:i2p-maintainers/i2p

sudo apt-get update

sudo apt-get install i2p

2- to Enable:

“on demand” using the i2prouter script. Simply run “i2prouter start” from a command prompt. (Note: Do not use sudo or run it as root!)
“on demand” without the java service wrapper (needed on non-Linux/non-x86 systems) by running “i2prouter-nowrapper”. (Note: Do not use sudo or run it as root!)
as a service that automatically runs when your system boots, even before logging in. The service can be enabled with “sudo dpkg-reconfigure i2p” as root or using sudo. This is the recommended means of operation.

3- Connect to your Router with a Cat5 Cable:
then type the IP to get to the Configuration Page:
(If you don’t know: look @ the Back of your Router to find the Model Number.
, open the web browser and type de model number + user Manual.
4- Just open the Port for I2P to be able to connect to the Internet.
(You should use a Different Port (From 10.000 to 50.000).


– Click on Restart on the Left side of the page.
– You have to install I2P software in every Device (Computer, Smartphone, Tablet…) You want to Use.

To uninstall:
sudo apt-get remove i2p


Configuration Page:

Advanced network configuration page:

The Invisible Internet Project (I2P)


From Wikipedia, the free encyclopedia

About P2PTV:
Peer-to-Peer Assisted Streaming Solution
From Wikipedia, the free encyclopedia:


My Opinion:
For Wired Network I’ll go with 100% Fiber.
For Wireless I go with LTE (long Term Evolution: https://en.wikipedia.org/wiki/LTE_(telecommunication) ).
For TV Broadcasting I’ll go with P2P Global Streaming.
Satellite are Very expensive & Last only 15 Years + It Creates the Space Junk https://en.wikipedia.org/wiki/Satellite
watch this Movie: https://en.wikipedia.org/wiki/Gravity_(film)
About an “Smart Internet”:
We can NEVER go 100% Digital.
Because with 100% Digital we can be hacked & the Time & Everything Else can Be Controlled from a Single (Evil) Person or a Company.
So I Believe that in every Town/City It has to Have a Human Being doing the Connections to the outside World.
Just like when they Invented the Telephone: https://en.wikipedia.org/wiki/Telephone ,
Electricity https://en.wikipedia.org/wiki/Electricity Network.
I do NOT Like Digital Electricity meters, Knows as “Smart meter” https://en.wikipedia.org/wiki/Smart_meter
Also Internet over Power Line, knows as Broadband over power lines https://en.wikipedia.org/wiki/Broadband_over_power_lines
I SEE a Big Danger with Illegal Internet Over Power Line Network & with Power Surge as a Broadband Power Modem.
It’s Time to Bring back Analog Devices. 50% of Each.

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points (“destinations”) are cryptographic identifiers (essentially a pair of public keys).
How does it work?

To anonymize the messages sent, each client application has their I2P “router” build a few inbound and outbound “tunnels” – a sequence of peers that pass messages in one direction (to and from the client, respectively). In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client’s inbound tunnels, eventually reaching the destination. Every participant in the network chooses the length of these tunnels, and in doing so, makes a tradeoff between anonymity, latency, and throughput according to their own needs. The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender’s and the receiver’s threat model.

The first time a client wants to contact another client, they make a query against the fully distributed “network database” – a custom structured distributed hash table (DHT) based off the Kademlia algorithm. This is done to find the other client’s inbound tunnels efficiently, but subsequent messages between them usually includes that data so no further network database lookups are required.

More details about how I2P works are available.
What can you do with it?

Within the I2P network, applications are not restricted in how they can communicate – those that typically use UDP can make use of the base I2P functionality, and those that typically use TCP can use the TCP-like streaming library. We have a generic TCP/I2P bridge application (“I2PTunnel”) that enables people to forward TCP streams into the I2P network as well as to receive streams out of the network and forward them towards a specific TCP/IP address.

I2PTunnel is currently used to let people run their own anonymous website (“eepsite”) by running a normal webserver and pointing an I2PTunnel ‘server’ at it, which people can access anonymously over I2P with a normal web browser by running an I2PTunnel HTTP proxy (“eepproxy”). In addition, we use the same technique to run an anonymous IRC network (where the IRC server is hosted anonymously, and standard IRC clients use an I2PTunnel to contact it). There are other application development efforts going on as well, such as one to build an optimized swarming file transfer application (a la BitTorrent), a distributed data store (a la Freenet / MNet), and a blogging system (a fully distributed LiveJournal), but those are not ready for use yet.

I2P is not inherently an “outproxy” network – the client you send a message to is the cryptographic identifier, not some IP address, so the message must be addressed to someone running I2P. However, it is possible for that client to be an outproxy, allowing you to anonymously make use of their Internet connection. To demonstrate this, the “eepproxy” will accept normal non-I2P URLs (e.g. “http://www.i2p.net”) and forward them to a specific destination that runs a squid HTTP proxy, allowing simple anonymous browsing of the normal web. Simple outproxies like that are not viable in the long run for several reasons (including the cost of running one as well as the anonymity and security issues they introduce), but in certain circumstances the technique could be appropriate.

The I2P development team is an open group, welcome to all who are interested in getting involved, and all of the code is open source. The core I2P SDK and the current router implementation is done in Java (currently working with both sun and kaffe, gcj support planned for later), and there is a simple socket based API for accessing the network from other languages (with a C library available, and both Python and Perl in development). The network is actively being developed and has not yet reached the 1.0 release, but the current roadmap describes our schedule.

Email: Integrated web mail interface, plugin for serverless email.
Web browsing: Anonymous websites, gateways to and from the public Internet.
Blogging and forums: Blogging and Syndie plugins.
Website hosting: Integrated anonymous web server.
Real-time chat: Instant messaging and IRC clients.
File sharing: ED2K and Gnutella clients, integrated BitTorrent client.
Decentralized file storage: Tahoe-LAFS distributed filesystem plugin.

Supported Applications

This is intended to be a comprehensive listing of applications used with I2P. If you know of something that’s missing please submit a ticket on Trac, and be sure to select the “www” component in the submission form.

Supported applications are tagged with one or more of the following:


Bundled application — I2P ships with a few officially supported applications that let new users take immediate advantage of some of I2P’s more useful capabilities.

Third-party plugin — I2P’s plugin system provides convenient deployment of I2P-enabled applications and allows tighter integration with the router. Plugins are [reviewed by the community](http://plugins.i2p.xyz) to identify security and anonymity issues.

standalone, standalone/mod

Third-party standalone application — Many standard network applications only require careful setup and configuration to communicate anonymously over I2P. These are tagged with standalone. Some applications, tagged with standalone/mod, require patching to function properly over I2P or to prevent inadvertent disclosure of identifying information such as the user’s hostname or external IP address.

Third-party essential network service — Services which on the I2P network are analogous to those provided on the public Internet by hosting providers, ISPs, and Google: eepsite indexes and jump services, search engines, email, DNS-style name services, hosting, proxies, etc. These services focus on boosting the usefulness of the network as a whole, and making network content more discoverable.

Unmaintained — This is used to tag plugins, applications, and services which appear to be unmaintained and may be removed from this listing in the future.

Warning: Using an application, plugin, or service with I2P doesn’t automatically protect your anonymity. I2P is merely a set of tools which can help you mitigate certain identified threats to anonymity. We do not and cannot make any guarantees about the safety of the applications, plugins, and services listed below. Most applications and plugins must be properly configured, and some will need to be patched — and even then your anonymity might not be assured. Similarly, services could put your anonymity at risk, either by design or through carelessness on their part or your own.

If you have doubts about the suitability of an application, plugin, or service for use with I2P, you are urged to inquire about privacy issues with its maintainers, to search its mailing lists and bug tracker if one exists, and consult trusted, knowledgeable members of the I2P community.

Take responsibility for your own anonymity and safety — always seek expert advice, educate yourself, practice good judgment, be mindful of disclosing personally identifying information, and don’t take shortcuts.
Blogging, Forums, and Wikis

El Dorado — Lightweight forum software. [standalone/mod]

Pebble — Another lightweight blogging platform. [plugin, standalone/mod]

phpBB — Most popular open source forum software. [standalone/mod]

Syndie — Distributed forums software, originally developed by jrandom. [plugin, standalone, unmaintained]

JAMWiki — A Java-based MediaWiki clone. No external database needed. Plugin available here. [standalone, plugin]

Decentralized File Storage

Tahoe-LAFS-I2P — Port of the Tahoe-LAFS distributed file system to the I2P network. Controller plugin here. [plugin, standalone]

Development Tools
Version control

Git — Most popular distributed version control system. [standalone]

Monotone — Another distributed version control system. Currently used in I2P development. [standalone]

Domain Naming

susidns — Provides management of addressbooks, which are part of a simple, user-controlled I2P naming system somewhat analogous to the Internet’s Domain Name System (DNS). Addressbooks map Base64 destinations to short, usually human-readable “domain” names ending with a .i2p suffix which the I2P router’s HTTP client can resolve back to Base64 addresses. (Note: While Base64 destinations are globally unique, addressbook “domain” names only resolve to unique destinations locally.) [bundled]


I2P-Bote — Serverless peer-to-peer email application using a distributed hash table (DHT) for secure mail storage. [plugin]

Postman’s anonymous email service — Provides email service within the I2P network via @mail.i2p addresses, and email gateway service between the I2P network and the public Internet via @i2pmail.org addresses. One of the oldest continuous services on I2P. [service]

susimail — Simple web browser-based email interface. Configured to use Postman’s email service by default. [bundled]

Sylpheed Claws, Thunderbird, other MUAs — Can be configured to use Postman’s email service. See this comparison of MUAs, and configuration settings for SMTP and POP3. [standalone]

File Sharing
BitTorrent clients

I2PSnark — I2P’s integrated BitTorrent client. [bundled]

I2PSnarkXL — Modified version of I2PSnark. [standalone]

Robert — A fork of rufus that uses the Basic Open Bridge (BOB) and has many improvements, including using the latest wxwidgets and python. It also supports use of seedless if installed for trackerless torrents and magnet-link like fetching of torrents within I2P. [standalone]

Transmission — Clean, full-featured cross-platform BitTorrent client with official ports for several GUI toolkits. [standalone/mod]

Azureus/Vuze — Has a plugin providing I2P support. [standalone, unmaintained]

BitTorrent trackers and indexers

For a detailed feature comparison of I2P-enabled trackers/indexers, see here.

Bytemonsoon — The code that powered one of the first major tracker/indexer sites on the Internet. Patched for I2P. [standalone/mod]

opentracker — Lightweight tracker/indexer. I2P mod available in the i2p.opentracker branch of the I2P Monotone repository. [standalone/mod]

zzzot — zzz’s Java-based open tracker. More info here. [plugin]


iMule — I2P port of the aMule ED2K client. [standalone]


I2Phex — Port of the Phex Gnutella client. Website for plugin version here. [plugin, standalone]

jwebcache — Cache for Gnutella peers on I2P. Website for plugin version here. [plugin, standalone]

Network Administration
General-purpose socket utilities

netcat — Unix standard tool for socket relaying. Several clones, ports, and forks have appeared over the years. [standalone]

socat — Like netcat but more powerful. [standalone]

tsocks — Proxy providing simple, transparent SOCKS-ification of network applications. [standalone]


OpenSSH — Most popular implementation of the Secure Shell (SSH) protocol and related tools. [standalone]

PuTTY — Open source Secure Shell (SSH) client for Windows. [standalone]

Real-time Chat
Instant messaging clients

I2P Messenger — IM client with multiple incarnations. [standalone]

IRC clients

Many IRC clients leak identifying information to servers or other clients, so I2P’s IRC and SOCKS IRC client tunnels filter certain inbound and outbound messages to scrub data such as LAN IP addresses, external IP addresses, local hostnames, and the name and version of the IRC client. Two message types in particular, DCC and CTCP, can’t be sufficiently anonymized without changes to the protocols or to IRC client/server code, so they are completely blocked, except for CTCP ACTION (the message emitted by the /me command) which isn’t inherently dangerous.

I2P’s IRC filtering may not cover every possible leak — users should also check if their client is sending their real name or local username. Packet sniffers such as Wireshark are useful here. Eliminating remaining leaks may be as simple as changing the client’s default configuration. If that doesn’t help, inform the I2P developers; they may be able to solve it via additional filtering.

jIRCii — Small Java-based IRC client. Plugin available here. [plugin, standalone]

XChat — Cross-platform graphical IRC client. [standalone]

irssi — Unixy terminal-based IRC client. [standalone]

WeeChat — Another Unixy terminal-based IRC client. [standalone]

IRC servers

ngIRCd — IRC server developed from scratch. [standalone/mod]

UnrealIRCd — Most popular IRC server. [standalone/mod]

Web Browsing
Anonymous websites

Eepsites — Any website hosted anonymously on I2P, reachable through the I2P router’s HTTP proxy. [service]

Deepsites — Distributed anonymous websites hosted using Tahoe-LAFS-I2P, currently only reachable with Tahoe-LAFS-I2P clients or through the Tahoe-LAFS-I2P HTTP proxy. [service]

i2host.i2p.xyz — Website for sponge’s jump service. Source code available. [service]

i2jump.i2p.xyz — Another jump service. [service]

identiguy.i2p.xyz — Dynamically updated eepsite index. [service]

stats.i2p — Website for zzz’s jump service. [service]

Proxy software

Polipo — SOCKS-enabled caching web proxy with basic filtering capabilities. [standalone]

Privoxy — Privacy-focused non-caching web proxy with advanced filtering capabilities. Excels at removing ads and other junk. [standalone]

Squid — Venerable caching web proxy. [standalone]


Gateways allowing users on the public Internet to access eepsites.

i2p.to — tino’s inproxy on the public Internet. [service]
i2p.us — Another inproxy on the public Internet. [service]
i2p.me — Another inproxy on the public Internet. [service]


Gateways allowing I2P users to access content hosted on the public Internet.

false.i2p — Publicly advertised outproxy running Squid, located in Europe. [service]

Website Hosting

Jetty — Lightweight web server and Java servlet container. I2P is tightly integrated with a bundled copy of Jetty which by default is configured to host the user’s eepsite. The bundled Jetty also serves the I2P router console and web applications bundled with I2P. [bundled, standalone]

Web servers

In addition to Jetty, any web server should function over I2P without modification so long as it’s HTTP-compliant. Some web servers known to currently serve content on the I2P network are:

Apache HTTP Server — Most popular web server on the public WWW. [standalone]

Apache Tomcat — Web server and Java servlet container. More features than Jetty. [standalone]

lighttpd — Fast lightweight web server. [standalone]

nginx — High-performance lightweight web server. [standalone]

Instructions for Ubuntu 12.04 Precise Pangolin (and newer) and derivatives like Linux Mint & Trisquel
Adding the PPA via the command line and installing I2P

CTRL ALT T to open a terminal and enter:
sudo apt-add-repository ppa:i2p-maintainers/i2p

This command will add the PPA to /etc/apt/sources.list.d and fetch the gpg key that the repository has been signed with. The GPG key ensures that the packages have not been tampered with since being built.

Notify your package manager of the new PPA by entering:
sudo apt-get update

This command will retrieve the latest list of software from each repository that is enabled on your system, including the I2P PPA that was added with the earlier command.
You are now ready to install I2P!
sudo apt-get install i2p

Adding the PPA Using Synaptic

Open Synaptic (System -> Administration -> Synaptic Package Manager).
Once Synaptic opens, select Repositories from the Settings menu.
Click the Other Sources tab and click Add. Paste ppa:i2p-maintainers/i2p into the APT-line field and click Add Source. Click the Close button then Reload.
In the Quick Filter box, type in i2p and press enter. When i2p is returned in the results list, right click i2p and select Mark for Installation. After doing so you may see a Mark additional required changes? popup. If so, click Mark then Apply.

After the installation process completes you can move on to the next part of starting I2P and configuring it for your system.
Instructions for Debian
Currently supported architectures include amd64, i386, armel, armhf (for Raspbian), and powerpc.

Note: The steps below should be performed with root access (i.e., switching user to root with “su” or by prefixing each command with “sudo”).

Add lines like the following to /etc/apt/sources.list.d/i2p.list.
For Wheezy:

deb https://deb.i2p2.de/ wheezy main
deb-src https://deb.i2p2.de/ wheezy main

For Jessie (stable):

deb https://deb.i2p2.de/ jessie main
deb-src https://deb.i2p2.de/ jessie main

For Testing (Stretch) or Unstable (Sid):

deb https://deb.i2p2.de/ unstable main
deb-src https://deb.i2p2.de/ unstable main

Download the key used to sign the repository and add it to apt:
apt-key add i2p-debian-repo.key.asc

Notify your package manager of the new repository by entering
apt-get update

This command will retrieve the latest list of software from every repository enabled on your system, including the I2P repository added in step 1.
You are now ready to install I2P! Installing the i2p-keyring package will ensure that you receive updates to the repository’s GPG key.
apt-get install i2p i2p-keyring

After the installation process completes you can move on to the next part of starting I2P and configuring it for your system.
Post-install work
Using these I2P packages the I2P router can be started in the following three ways:

“on demand” using the i2prouter script. Simply run “i2prouter start” from a command prompt. (Note: Do not use sudo or run it as root!)
“on demand” without the java service wrapper (needed on non-Linux/non-x86 systems) by running “i2prouter-nowrapper”. (Note: Do not use sudo or run it as root!)
as a service that automatically runs when your system boots, even before logging in. The service can be enabled with “dpkg-reconfigure i2p” as root or using sudo. This is the recommended means of operation.

When installing for the first time, please remember to adjust your NAT/firewall if you can. The ports to forward can be found on the network configuration page in the router console. If guidance with respect to forwarding ports is needed, you may find portforward.com to be helpful.

Please review and adjust the bandwidth settings on the configuration page, as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative.

If you want to reach eepsites via your browser, have a look on the
page for an easy howto.

Peer-to-Peer Assisted Streaming Solution refers to peer-to-peer (P2P) software applications designed to redistribute video streams in real time on a P2P network; the distributed video streams are typically TV channels from all over the world but may also come from other sources. The draw to these applications is significant because they have the potential to make any TV channel globally available by any individual feeding the stream into the network where each peer joining to watch the video is a relay to other peer viewers, allowing a scalable distribution among a large audience with no incremental cost for the source.


2016 – How-to Create a Perfect Auto Sustainability System Forever – December 20

Think About a Global Smart 21st Century Industrial Revolution.
WE Need (I will Create My OWN System):

We Need to Create a Global Authority to Manage the System.

01- Global Smart Open Source Identification Device, Know as ID Card.
– With ALL this Hacking Going on, I Believe Every ID System has Been Cracked.
– We Should Move Away from HTTP. (It’s 2017 and We Still use HTTP !!!!!!).
02- Global Smart Open Source Tax System
– X % (percentage) Goes to the Companies who Created the Technology + to the Companies who licensed the Technology.
– Every Component will have X number of percentage,
(Imagine a Car, Truck, Airplane, Train, Ship…)
– X % (percentage) Goes to the Companies who Created the Technology + to the Companies who licensed the Technology.
03- Global Smart Open Source Invention Network System.
– X Percentage of the Money Goes to the Companies who Created the Technology + to the companies Who Licensed the Technology.
04- Global Smart Open Source Hardware & Software Transportation System
05- Global Smart Open Source Hardware & Software Government System
06- Global Smart Open Source Hardware & Software Personal Voting Machine System.
– It’s ONE way Voting Machine.
– NO Network.
– We Buy the Machine & Create a Smart Password.
– NO Radios.
07- Global Smart Open Source Hardware & Software Health Care Development System
08- Global Smart Open Source Hardware & Software Banking System
– We need to put an END on Coins.
– We Need an Analog to Digital Money Bill.
09- Global Smart Open Source Politic Party
10- Global Smart Open Source 3D E-Shopping Mall
– In Every Browser will have a Shortcut of this Web Page.
– Will use Tor & I2P Secure Communications.
– In Each Country their Programmers will have a Complete Website
with Everything they want to Buy, Sale & Rent.
– Companies from Around the Globe will be able to interact with other
Companies and License their technology.
-Countries Can HIRE People from Other Countries.
11- Global Smart Open Source Smart Password Machine.
-Can be an Android or GNU+Linux Tablet with NO Network & NO Radios.
-One Way Smart Technology

Everything Can RUN on Top of Google Services Like:
YouTube, Google Photos, Google+, Blogger, Hangouts + Linphone https://www.linphone.org/, Jitsi https://jitsi.org/, Telegram https://telegram.org/ , Pidgin https://pidgin.im/ , Yahoo Messenger, Twitter, WordPress + Others…

My Quote:
In a Global Smart Society, the People will be the Police & the Government !
J Renato S or Renato ZX
2016 December 20

Software Used to Text to Speech:


Screen shots of this Video + this TEXT on Google Photos:


Press F11 to View in Full screen

The YouTube Video:

Linux Mint Computers:

Linux Mint T-shirts (Worldwide Shipping):

Buy Live CD, Live DVD & Live USB from ANY GNU+Linux Operating Systems (Worldwide Shipping):

GNU+linux Magazine (Worldwide Shipping):




Fast, secure, easy-to-use browser
Try the Opera browser – now with a built-in ad blocker, battery saver and free VPN.

Get a Free WordPress Website:

Get Free Unlimited Image & Video Storage with Google Photos:

Publish your passions, your way
Create a unique and beautiful blog. It’s easy and free.

Folllow me @
Google+ :


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s