The I2P Project itself does not run any proxies to the Internet. The I2P software includes a default outproxy: exit.stormycloud.i2p. These are run by StormyCloud Inc. https://stormycloud.org
By default, I2P comes with one outproxy configured: exit.stormycloud.i2p.
From the very bottom of this page (assuming you downloaded the i2p Java implementation -- I have no idea about the C++ version).
If you Google "what's my ip?" then you should see something like "Your IP address is 144.172.118.151 in Spring, Texas, United States (77387)", which makes sense since StormyCloud Inc. is apparently based in Texas.
If you want a solution that works on every Linux distribution, you can install Docker and run i2pd (a high-performance C++ variant of I2P) as a container. The Docker image is: purplei2p/i2pd Or…, even easier, you can run i2pd via flatpak (also works on every distro). See here: i2pd.readthedocs.io/en/latest/…/install/ Hope this helps 🙂
Excellent question. In the case of Java I2P and of I2P+, the attacker is actually gaming the sybil attack tool in order to trick routers into erroneously banning floodfills.
Basically the attacker has found a way to trick real routers into attempting to connect to fake routers. Normally, this is not harmful, fake routers are just offline routers. Offline forever.
But if you craft your fake router this one specific way then the router you are tricking thinks some real router, which is usually reachable, is offline. That’s how it affects I2P without the sybil tool. The sybil tool, in this case, amplifies the effect of the attack and the duration of the attack, because the real router which is ddos’ed gets banned by the sybil tool.
Edit: I am deliberately leaving out specific details here.
Stormy is an understatement. Last I checked, I was sitting at 4% - though it bears noting that I’m running my I2P router on a Pi, so I2PD is a bit out of date for me
i2p
Hot
This magazine is from a federated server and may be incomplete. Browse more on the original instance.