I2P Browsing

I2P network browsing made easy.

Proxy is ready.

New to I2P? Learn more here.

I2P Browser allows you to surf the internet using the private and secure I2P network. When using it, you are protected against tracking, surveillance, and censorship as a first-class participant in the I2P network. I2P Browser isolates cookies and deletes your browser history after your session. These modifications ensure your privacy and security are protected in the browser.

We also provide you with additional settings for bumping up your browser security. Our Security Settings allow you to block elements that could be used to attack your computer. Click below to see what the different options do. Note: By default, NoScript and HTTPS Everywhere are not included on the toolbar, but you can customize your toolbar to add them. With all the security and privacy features provided by I2P, your experience while browsing the internet may be a little different. Things may be a bit slower, and depending on your security level, some elements may not work or load. You may also be asked to prove you are a human and not a robot.

I2P is capable of using peer-to-peer applications like BitTorrent, protecting your identity when you share files. Our anonymous bittorrent client is available in the browser.

There is also an anonymous e-mail service available inside of I2P, which is accessible from our browser via the menu directly below.

This extension works automatically when you are browsing I2P sites. If you want to use I2P as a proxy to non-I2P sites, use the I2P In Private Browsing button in the toolbar and click New I2P Browser Tab to switch to I2P Browsing in a new tab.

With all the security and privacy features provided by I2P, your experience while browsing the internet may be a little different. Things may be a bit slower, and depending on your security level, some elements may not work or load. You may also be asked to prove you are a human and not a robot.

Applications

These applications use I2P to provide them with security and privacy.

  • Router Console The entrypoint for all other I2P applications is the I2P Router Console. To visit it, click here.
  • Hidden Services Manager I2P has a web-based interface for configuring .i2p services like web sites, to set up your own web sites, go here:
  • E-Mail I2P also bundles a webmail client which can be used to access in-I2P e-mail. To use it, go here:
  • BitTorrent I2P is capable of anonymous Peer-to-Peer file sharing, to use the built-in bittorrent client go here:

If you want to get more information about I2P, you can visit these links.