Hey! I think anonymous networks would grow in far more popularity if people were allowed to participate on them with minimal to no hassle. Today, I2P requires Java (inconvenient) and downloading a program (inconvenient). I dislike Java so much that I compile I2PD (C++ router) solely for avoiding that, but this too is inconvenient.
I can build something that works on existing web browsers and users can transparently participate in anonymous networks without downloading any new software at all. Is there interest in something like this? If there is, I'm open for business. Please reach out to me.
Convenient Anonymity
-
WellBehavedDemon
- Posts: 2
- Joined: 09 Oct 2025 23:01
Re: Convenient Anonymity
This sounds like you are talking about something simular to Tor2Web or any of those Online Proxie Sites that connect you directly to Tor through a clearnet browser. Is this simular to what you are looking for?WellBehavedDemon wrote: ↑17 Oct 2025 13:14I can build something that works on existing web browsers and users can transparently participate in anonymous networks without downloading any new software at all. Is there interest in something like this?
By the way, there is a site for Clearnet/Tor Users who are curious about I2P to try it out without the I2P Router on their system.
https://i2phides.me/
http://ml5oqtnuk5fj5sohpssh44rpqontkdxt ... oad.onion/
-Chef K
-
WellBehavedDemon
- Posts: 2
- Joined: 09 Oct 2025 23:01
Re: Convenient Anonymity
Not at all. I loathe Tor (has a long track record of serious security vulnerabilities and it's highly likely a honeypot funded by the U.S. government). It's the same scam in regards to VPNs (all of them are owned by Israelis).This sounds like you are talking about something simular to Tor2Web or any of those Online Proxie Sites that connect you directly to Tor through a clearnet browser. Is this simular to what you are looking for?
The clearnet is not a priority of mine. There is no anonymous network that is easy to work with (I2P is heavyweight and it's hard to develop independent implementations). This proposal is so that we have an anonymity layer that allows for anonymous software (anonymous chat, anonymous Twitter, anonymous message board, anonymous file storage) to become a reality. I'm writing a document to explain how it will be implemented:


I'm aware that I'm posting this in the I2P forum. The protocol that I have in mind isn't compatible with I2P, but bridges are possible (if there is a demand for it, because I do not know software that needs I2P to work).
[EDIT] Chef K, let me make something clear: in this anonymity layer that I'm proposing, web users are actively participating in it. They become nodes in the anonymity layer. expanding it. What you have presented are bridges, where users see the network but do not participate in it. With WebSockets, it's possible for a user to connect to two different servers and act as a relay of packets, as proxy, effectively participating in it, having many edges to the network (unlike your proposals, where there is only one edge between the user and the network, which can only passively receive data but not relay it).