
It uses Tor’s services for providing the anonymity but adds extra security layers. It has in-built pre-configured apps that give you the services of a web browser, IM client, office suite, editors for image and sound etc. It is a live operating system which could be started from any computer using a USB drive, DVD or a SD card. Tails is one of the best Tor alternatives available out there. There are unidirectional tunnels instead if bidirectional circuits, thus making the number of nodes double which a node has to compromise to get the same information. Unlike Tor, peers are selected based on continuous ranking and profiling. It is designed and optimized for hidden services, faster than Tor with fully distributed and self-organizing capability. Just like any other P2P software, the software implementing this computer network layer is called I2P layer and other computers running I2P is called I2P node.


I2P is an anonymous peer-to-peer distributes communication layer which is built using the open source tools.
