You must log in or register to comment.
What’s the relation to, or comparison to i2p? Can you expand a bit on what it is, or what it does better or different than i2p?
It’s not an anonymity network, just autorouted overlay (but can do L2 eventually) IPv6-only user-side encrypted decentralized network with explicit peering. You can run i2p over it as well as anything else as long it can do IPv6-only.