I2P for Mac OS X 2.5.2 freeware

... library available to allow reliable streaming communication on top of it. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. ...

Author I2P Team
Released 2024-05-17
Filesize 28.80 MB
Downloads 1031
OS Mac OS X
Installation Instal And Uninstall
Keywords network message, network communication, tunnel manager, network, message, peer
Users' rating
(28 rating)
I2P for Mac OS XOtherMac OS X
I2P for Mac OS X - top model Freeware Download Notice

I2P for Mac OS X Free Download - we do not host any I2P for Mac OS X torrent files or links of I2P for Mac OS X on rapidshare.com, depositfiles.com, megaupload.com etc. All I2P for Mac OS X download links are direct I2P for Mac OS X download from publisher site or their selected mirrors.

I2P for Mac OS X freeware - The Latest User Reviews
I2P for Mac OS X freeware - The Latest Versions History
2.5.2 May 17, 2024 New Release
2.5.1 May 7, 2024 New Release
2.5.0 Apr 10, 2024 New Release Changes:
I2PTunnel: Implement support for Keepalive/Server-side Persistence
Susimail: Add markdown support for formatted plain-text content
Susimail: Add HTML Email support
I2PSnark: Add search capability
I2PSnark: Preserve private=0 in torrent files
Data: Store compressed RI and LS
Bug Fixes:
Susimail: Fix handling of forwarded mail with attachments
Susimail: Fix handling of forwarded mail with unspecified encoding
Susimail: Fix forwarding of HTML-only email
Susimail: Bugfixes in presentation of encoded attachmments, mail body
I2PSnark: Handle data directory changes
SSU2: Cancel peer test if Charlie does not have B cap
SSU2: Treat peer test result as unknown if Charlie is unreachable
Router: Filter additional garlic-wrapped messages
I2CP: Prevent loopback messages to same session
NetDB: Resolve Exploratory/Router isolation-piercing event

Most popular Other freeware downloads

I2P for Mac OS X

2.5.2 freeware download

... by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and ... meet both the sender's and the receiver's threat model. ...