This is the official repository for the I2P project. For instructions, see below, and more information is on geti2p.net.
For Ubuntu, we recommend our PPA instead, and instructions are on geti2p.net.
The signing key for this repo may be downloaded here.
Any necessary dependency packages will be found in either Debian's repository or this one. Please report any problems with the I2P packages on the I2P Bug Tracker. Bugs for Anoncoin should be reported on its Github project page.
Add lines like the following to /etc/apt/sources.list.d/i2p.list
.
For Debian Wheezy (EOL May 2018):
deb https://deb.i2p2.de/ wheezy main deb-src https://deb.i2p2.de/ wheezy main
For Debian Jessie (EOL June 2020):
deb https://deb.i2p2.de/ jessie main deb-src https://deb.i2p2.de/ jessie main
For Debian Stretch (oldoldstable):
deb https://deb.i2p2.de/ stretch main deb-src https://deb.i2p2.de/ stretch main
For Debian Buster (oldstable):
deb https://deb.i2p2.de/ buster main deb-src https://deb.i2p2.de/ buster main
For Debian Bullseye (stable):
deb https://deb.i2p2.de/ bullseye main deb-src https://deb.i2p2.de/ bullseye main
For Debian Bookworm (newstable):
deb https://deb.i2p2.de/ bookworm main deb-src https://deb.i2p2.de/ bookworm main
For Debian testing or Sid (unstable):
deb https://deb.i2p2.de/ unstable main deb-src https://deb.i2p2.de/ unstable main
For Ubuntu Precise (LTS 12.04):
deb https://deb.i2p2.de/ precise main deb-src https://deb.i2p2.de/ precise main
For Ubuntu Trusty (LTS 14.04):
deb https://deb.i2p2.de/ trusty main deb-src https://deb.i2p2.de/ trusty main
For Ubuntu Xenial (LTS 16.04):
deb https://deb.i2p2.de/ xenial main deb-src https://deb.i2p2.de/ xenial main
For Ubuntu Bionic (LTS 18.04):
deb https://deb.i2p2.de/ bionic main deb-src https://deb.i2p2.de/ bionic main
For Ubuntu Focal (LTS 20.04):
deb https://deb.i2p2.de/ focal main deb-src https://deb.i2p2.de/ focal main
For Ubuntu Groovy (20.10):
deb https://deb.i2p2.de/ groovy main deb-src https://deb.i2p2.de/ groovy main
For Ubuntu Hirsute (21.04):
deb https://deb.i2p2.de/ hirsute main deb-src https://deb.i2p2.de/ hirsute main
For Ubuntu Impish (21.10):
deb https://deb.i2p2.de/ impish main deb-src https://deb.i2p2.de/ impish main
For Ubuntu Jammy (LTS 22.04):
deb https://deb.i2p2.de/ jammy main deb-src https://deb.i2p2.de/ jammy main
After adding the repo to apt, update the package list with
sudo apt-get update
APT will likely complain about a missing key. If it does you can resolve this by running the following:
sudo apt-get install i2p-keyring && apt-get update
Alternately, you may download the key here and then do:
sudo apt-key add i2p-debian-repo.key.asc
The current contents of the repo are listed below. This information is automatically generated.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
Syndie anonymous distributed forums
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
This package provides digital keys used for signing I2P's repositories. Upon instalation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
TrueType fonts (such as those provided in the package fonts-dejavu) are required in order to generate graphs.
Invisible Internet Project (I2P) - anonymous network
Invisible Internet Project (I2P) - developer documentation
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
Invisible Internet Project (I2P) - Router
This package provides digital keys used for signing KillYourTV's repositories. Upon instalation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
Invisible Internet Project (I2P) - libjbigi library
Syndie anonymous distributed forums
Invisible Internet Project (I2P) - anonymous network
Invisible Internet Project (I2P) - developer documentation
Invisible Internet Project (I2P) - Router
Anoncoin is a free open source peer-to-peer electronic cash system that is completely decentralized, without the need for a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending. Anoncoin is a fork of Bitcoin.
Full transaction history is stored locally at each client. This requires 200 MB+ of space, slowly growing.
This package provides Anoncoin-Qt, a GUI for Anoncoin based on Qt.
Anoncoin is a free open source peer-to-peer electronic cash system that is completely decentralized, without the need for a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending. Anoncoin is a fork of Bitcoin.
Full transaction history is stored locally at each client. This requires 200 MB+ of space, slowly growing.
This package provides anoncoind, a combined daemon and CLI tool to interact with the daemon.
Invisible Internet Project (I2P) - anonymous network
Invisible Internet Project (I2P) - developer documentation
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
Invisible Internet Project (I2P) - Router
This package provides digital keys used for signing KillYourTV's repositories. Upon instalation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
Invisible Internet Project (I2P) - libjbigi library
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
This package contains the javadoc files.
This Package contains the Java jar libraries used by the Java Service Wrapper. It can be used to handle wrapper specific attributes.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
This Package contains the JNI libraries used by the Java Service Wrapper.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
Syndie anonymous distributed forums
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
TrueType fonts (such as those provided in the package fonts-dejavu) are required in order to generate graphs.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
This Package contains the Java jar libraries used by the Java Service Wrapper. It can be used to handle wrapper specific attributes.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
This Package contains the JNI libraries used by the Java Service Wrapper.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
Invisible Internet Project (I2P) - anonymous network
Invisible Internet Project (I2P) - developer documentation
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
Invisible Internet Project (I2P) - Router
Invisible Internet Project (I2P) - libjbigi library
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
TrueType fonts (such as those provided in the package fonts-dejavu) are required in order to generate graphs.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
This package provides digital keys used for signing I2P's repositories. Upon installation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package provides digital keys used for signing KillYourTV's repositories. Upon instalation of this package, your APT trusted keyring will updated with these keys. Upon removal of this package, the keys provided by this package will be removed from the APT trusted keyring.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
This package contains the javadoc files.
This Package contains the Java jar libraries used by the Java Service Wrapper. It can be used to handle wrapper specific attributes.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
This Package contains the JNI libraries used by the Java Service Wrapper.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
Syndie anonymous distributed forums
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
This package contains the Javadoc files.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
TrueType fonts (such as those provided in the package fonts-dejavu) are required in order to generate graphs.
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.
This Package contains the JNI libraries used by the Java Service Wrapper.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.
The Java Service Wrapper makes very easy to install a Java Application as a daemon process on Unix systems. The Wrapper monitors a JVM (Java Virtual Machine) process and automatically restarts it if it that the JVM has crashed or hung. This process takes just a few seconds once the Wrapper has decided there is a problem. It also gives the ability to handle process priority.