Anonymity Networks: Tor, I2P and Freenet

Liam Nivvas
5 min readJan 17, 2023

--

Photo by Clint Patterson on Unsplash

Anonymity:

Anonymity refers to the state of being anonymous or not having a publicly known identity. In the context of the internet, anonymity can refer to the ability of a person to use the internet without revealing their identity or to the ability of a message or piece of information to be sent without identifying the sender. Anonymity can also refer to the state of an individual or group whose identity is unknown or undisclosed.

Anonymity Networks:

Anonymity networks, also known as darknet or privacy networks, are networks that are designed to protect the anonymity of their users. These networks can be used to access the internet, send messages, or share files, all while keeping the users’ identities hidden.

The most well-known anonymity network is Tor (The Onion Router) which route the internet traffic through a series of randomly selected servers, in order to conceal the user’s IP address and location. Other examples of anonymity networks include I2P (Invisible Internet Project) and Freenet. These networks often use encryption and other privacy-enhancing technologies to protect the anonymity of their users.

Anonymity networks are often used by people who want to protect their privacy, avoid censorship, or engage in activities that may be considered illegal or controversial. However, it’s also important to note that anonymity networks can also be used for malicious activities, such as cybercrime, so it’s important to use them responsibly.

Tor: The Onion Router

Tor, short for “The Onion Router,” is an open-source, free software privacy network that enables users to communicate anonymously on the internet. It is a decentralized network of servers that routes internet traffic through a series of randomly selected servers, in order to conceal the user’s IP address and location.

When a user connects to the Tor network, their internet traffic is encrypted and routed through several randomly selected nodes, known as “onion routers.” Each onion router decrypts only one layer of encryption, revealing only enough information to route the traffic to the next node. By the time the traffic reaches its destination, it has been through multiple layers of encryption and routing, making it extremely difficult to trace the original source of the traffic.

The Tor network is often used by people who want to protect their privacy online, avoid censorship, or engage in activities that may be considered illegal or controversial. Some examples of its usage are: Whistleblowers, journalists, human rights activists, people living in authoritarian countries, law enforcement agencies, and many more.

Tor also provides access to the so-called “darknet” or “hidden services,” which are websites that can only be accessed through the Tor network and are not accessible through regular internet browsers.

It’s important to note that while Tor provides a high degree of anonymity, it is not completely foolproof and can still be vulnerable to certain types of attacks. Also, using Tor for illegal activities is not encouraged and is still traceable by law enforcement agencies.

Working of Tor

I2P: Invisible Internet Project

I2P (Invisible Internet Project) is an open-source, free software anonymity network that enables users to communicate anonymously on the internet. It is a decentralized peer-to-peer network that routes internet traffic through a series of randomly selected servers, similar to Tor, in order to conceal the user’s IP address and location.

When a user connects to the I2P network, their internet traffic is encrypted and routed through several randomly selected nodes, known as “routers.” Each router decrypts only one layer of encryption, revealing only enough information to route the traffic to the next node. By the time the traffic reaches its destination, it has been through multiple layers of encryption and routing, making it extremely difficult to trace the original source of the traffic.

The I2P network is often used by people who want to protect their privacy online, avoid censorship, or engage in activities that may be considered illegal or controversial. Like Tor, it also provides access to the so-called “darknet” or “hidden services,” which are websites that can only be accessed through the I2P network and are not accessible through regular internet browsers.

It’s important to note that while I2P provides a high degree of anonymity, it is not completely foolproof and can still be vulnerable to certain types of attacks. Also, using I2P for illegal activities is not encouraged and is still traceable by law enforcement agencies.

It’s worth to mention that I2P is less popular than Tor and it’s used by a smaller community, but it has certain advantages over Tor, for example, it has a native support for eepSites, which are equivalent to Tor’s onion sites, but with a different naming and addressing system.

Working of I2P

Freenet:

Freenet is an open-source, free software anonymity network that enables users to communicate and share files anonymously on the internet. It is a decentralized peer-to-peer network that uses a technique called “distributed data storage” to route internet traffic and store files in a decentralized way.

When a user connects to the Freenet network, their internet traffic is encrypted and routed through several randomly selected nodes, known as “peers.” Each peer decrypts only one layer of encryption, revealing only enough information to route the traffic to the next node. By the time the traffic reaches its destination, it has been through multiple layers of encryption and routing, making it extremely difficult to trace the original source of the traffic.

Freenet also allows users to publish and download files on the network, using a technique called “Insertion and Request” that allows files to be stored and retrieved in a decentralized way, making it difficult to trace the original source of the files. Additionally, Freenet uses a technique called “Darknet” which allows users to connect only to trusted peers, making it more secure than other networks that allow anyone to connect.

Like the other anonymity networks, Freenet is often used by people who want to protect their privacy online, avoid censorship, or engage in activities that may be considered illegal or controversial. However, it’s also important to note that Freenet can also be used for malicious activities, such as cybercrime, so it’s important to use it responsibly.

It’s worth noting that Freenet is less popular than Tor and I2P, it has a smaller community and less developed ecosystem, but it’s known for its high security, privacy and decentralization features.

A typical request sequence. The request moves through the network from node to node

Stay anonymous and stay safe!

Happy reading!

--

--

Liam Nivvas

Cyber-security Researcher, Darkweb Analyst ,Application Developer and Trainer! You may buy me a coffee @ paypal.me/nivvas