Introduction: I2VPN


Service introduction – as it was provided by the service owner: I2VPN (i2vpnraen5bggqge.onion) is a new VPN that provides you guaranteed anonymity and security through a anonymizing network known as I2P. I2VPN is rather unique and wraps all of its connections via random computers in the world (like Tor) which none of us own.. I2VPN has also many features such as transparency, Whonix-style workstations, a API, et cetra.

I2VPNdiagram-ng-1I2VPNdiagram-ng-1 I2VPNdiagram-ng-2I2VPNdiagram-ng-2

Service fee is around 4$, Payments are easy and can be done using any of these methods: BTC, DASH.

One of the I2VPN’s many features is: disposable exit, Disposable exit is something that no other VPN has, our exits are disposable and do not contain any information about you. (Be it your
username/password/hashes or your OpenVPN PSK) When you connect to I2VPN, you do so to our trusted main which are hosted in-house by us, no colocation, no dedicated server, no VPS. Main contains everything about you and is highly secured, using technologies like Qubes, Tor, I2P and many others, Exit only sees a single connection (from main) and only stores a temporary PSK that is to be regenerated every time main reconnects.

Another feature is API:

I2VPN is one of the few VPNs with API, our API allows you to:

  1. Dynamically readjusting applications which periodically change locations.
  2. Applications which require more than one tunnels.
  3. Only to be limited by your imagination.

About privacy and anonymity:

Most of our exits are outside US, and the main node itself is outside of US. All statuses of all servers are publicly shown on the website. All emails sent will be either PGP encrypted (if you offer us your PGP public key) or be PGP signed (if not PGP key) No logs are kept, all logs are disposed when you log out or switch servers.



We are not aiming to run off with your money… We offer escrow so that you can be sure that we won’t run off. One of the biggest problems with VPN is their abuses and notices… I2VPN is very strong with abuses, if we see that someone is abusing the service and doing something that we don’t accept, we will temporarily block all connections to that endpoint. That being said, we don’t consider P2P as a abuse, file-sharing is considered to be a right by I2VPN developers and we won’t implicitly log your connections if you use P2P.
I2VPN also conforms to notices even if we are based in darknet, with that being said, we can’t handover any information (logs) because we don’t simply have them…

Future improvements:

We are aiming to complete our API system and making a community center for all democratic polls on what they would like to see in I2VPN..

And 2-per-week drive-in with movies (which are selected by users) and a 24/7 music stream (music also selected by users).

Feel free to check the service and provide your feedback: http://i2vpnraen5bggqge.onion/

Share and Enjoy

  • FacebookFacebook
  • TwitterTwitter
  • DeliciousDelicious
  • LinkedInLinkedIn
  • StumbleUponStumbleUpon
  • Add to favoritesAdd to favorites
  • EmailEmail
mm – leading Bitcoin News source since 2012

Virtual currency is not legal tender, is not backed by the government, and accounts and value balances are not subject to consumer protections. The information does not constitute investment advice or an offer to invest.