Skip to content
#

i2p

Here are 97 public repositories matching this topic...

nonlinear-chaos-order-etc-etal
nonlinear-chaos-order-etc-etal commented Sep 22, 2019
flatpak-builder --user --install --force-clean i2pd_build_dir website.i2pd.i2pd.json
…
Running: ./b2 -j $FLATPAK_BUILDER_N_JOBS install --prefix=/app
Invalid value for the '-j' option.
Error: module boost: Дочерний процесс завершился с кодом 1

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is a mirror of the official Monotone repository.

  • Updated Jan 29, 2020
  • Java
chaingrok
chaingrok commented Jan 18, 2020

Why are you submitting this feature request
the REST requests GET[https://api.temporal.cloud//v2/account/key/ipfs/get]
returns
{
"code": 200,
"response": {
"key_ids": [
"QmY8Ho4JurCFM8E3sf7tHc7px6J8s3tw1QPbpczrKZrtfY",
"12D3KooWAY2D4azyxxiAYPPdEwnrZf4M1aa5RHtaDrJ5T3VqTdJb"
],
"key_names": [
"chaingrok-TestKey1",
"chaingrok-TestKey2"
]

str4d
str4d commented Nov 5, 2018

Currently, if a message is sent to an unconnected peer, but the transport handshake fails, the message persists in the pending session cache for that transport. When a subsequent message is sent to that peer, the presence of the peer in the pending session cache means that it is also cached, on the assumption that a session is pending. The result is that if a connection fails to a peer due to tran

ivilata
ivilata commented Oct 15, 2018

Currently we lack a canonical format for URLs used as keys. For instance, one browser may request http://foo.bar/foo-bar and another one http://foo.bar/foo%2dbar, which are the same URL, but since we don't try to put them in a single format, they would get injected under two different keys.

This applies both to IPFS and BEP44.

eyedeekay
eyedeekay commented Jan 6, 2020

The primary purpose of this library is to create network interfaces that applications that want to use I2P to hide their physical location from a peer on a peer-to-peer network can attach to. It goes from IP->I2P and I2P<-IP and it works as a way of adapting applications by simulating a private network on top of an anonymous network.

But it doesn't do something most people seem to expect of the

Improve this page

Add a description, image, and links to the i2p topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the i2p topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.