(Added the I2P project)
 
(Set location)
 
(One intermediate revision by one other user not shown)
Line 2: Line 2:
 
|Has website=https://geti2p.net
 
|Has website=https://geti2p.net
 
|Has contact=@geti2p, @i2p, @hottuna_i2p
 
|Has contact=@geti2p, @i2p, @hottuna_i2p
|Has description= I2P is a mixed-license free and open source project building an anonymous network. The network is a simple layer that applications can use to anonymously and securely send messages to each other.  
+
|Has description=I2P is a mixed-license free and open source project building an anonymous network. The network is a simple layer that applications can use to anonymously and securely send messages to each other.
|Related to assembly=CryptoParty,  
+
|Related to assembly=CryptoParty, Anarchist Village,
|Has assembly tag=anonymity, privacy, onion routing, open source,  
+
|Has assembly tag=anonymity, privacy, onion routing, open source,
 
|Provides session location=no
 
|Provides session location=no
 
|Has orga contact=33c3@isawanker.eu
 
|Has orga contact=33c3@isawanker.eu
Line 16: Line 16:
 
We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.
 
We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.
 
|Has past congress review=We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.
 
|Has past congress review=We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.
 +
|Has x-coordinate=4236.74998
 +
|Has y-coordinate=1390.95141
 
}}
 
}}
 
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
 
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

Latest revision as of 20:35, 26 December 2015

Website https://geti2p.net
Contact @geti2p, @i2p, @hottuna_i2p
Description I2P is a mixed-license free and open source project building an anonymous network. The network is a simple layer that applications can use to anonymously and securely send messages to each other.
Members Cacapo, Echeloni2p
Projects I2P
Self-organized Sessions create self-organized session
Related to assembly CryptoParty, Anarchist Village
Tags anonymity, privacy, onion routing, open source
Registered on 9 November 2015 18:47:52
Location for self-organized sessions no
Self-organized session notes I2P roadmapping, I2P crypto discussion, I2P Intro
Other assemblies by tags...
Location
Note: The location on the map does not represent a reservation of a location and might not represent the actual place, where a assembly can be found. The place can be changed within the form of the assembly by anyone. It will be updated by the assembly itself on day 0 or day 1 as soon as the actual location is known.
Orga contact 33c3@isawanker.eu
Brings We bring the I2P development team and a few laptops for doing introductory demoing as well as stickers and gummi candy.
Character of assembly place to show and meet
Seats needed 8
Extra seats 4
Assembly specification loud place ok, want sit public
Planning notes We would like a public area, dark or bright, ideally doesn't allow pictures (but we're flexible).

We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.

past congress review We were located next to the EFF at Noisy Square the two previous years and have been very happy with that location.

I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.

No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. Help spread the word!