BIG FAT DISCLAIMER
This tutorial is not gaurenteed to provide absolute security as some of the components have not been properly audited.
If you know you are under targeted survailence please by god consult the EFF .
For a while I have been meaning to start a blog about i2p so here it is. First thing's first, a helpful tutorial for newbies.
IRC, internet relay chat "what hackers use when they don't want to be overheard" while hacky and primative is a useful chat protocol. In general IRC is not private, server opers may log private messages and public channels are often logged for historical purposes. Considering that IRC is a very public procotocl one can still use it for secure and (more or less) authenticated communications. Off-The-Record, aka OTR is a common plaintext chat encryption protocol that works over IRC and XMPP. It allows you to have a private convorsation …