I2P Easy Manager is designed with privacy and security as core principles. This document explains the security measures implemented and how to use the tool safely.
The tool automatically applies hardened Firefox preferences that protect against:
- Fingerprinting - Disabled JavaScript identifiers and reduced browser fingerprint surface
- WebRTC Leaks - WebRTC disabled to prevent IP address leakage
- DNS Leaks - DNS-over-HTTPS enabled and proxy-only DNS
- Telemetry - All Mozilla telemetry disabled
- Tracking - Built-in tracking protection enabled
- Geolocation - Geolocation permission disabled
The tool configures Firefox to use I2P's SOCKS5 proxy for:
- HTTP connections
- HTTPS connections
- DNS queries (SOCKS remote DNS enabled)
privacy.resistFingerprinting = true
media.peerconnection.enabled = false // WebRTC disabled
webgl.disabled = true // WebGL disabled
network.dns.disablePrefetch = true
network.prefetch-next = false
geo.enabled = false
toolkit.telemetry.enabled = false
dom.security.https_only_mode = true- This tool routes traffic through I2P, not a commercial VPN
- I2P provides anonymity for specific services, not blanket internet encryption
- Requires proper I2P network setup and integration time (10-30 minutes)
- I2P provides strong anonymity for specific services (like hidden sites)
- Exit node traffic over clearnet may be identifiable
- Always verify the I2P service you're connecting to is trustworthy
- Malware - Use antivirus software separately
- Phishing - Use standard web security practices
- Social Engineering - Use good judgment
- Unencrypted Applications - This only protects Firefox
- Use the I2P profile exclusively for I2P services
- Don't mix regular and I2P browsing in the same profile
- This prevents correlation attacks
i2p-manager statusWait until you see "CONNECTED" status before accessing .i2p sites.
Before accessing sensitive content:
- Visit http://i2p-project.org/ (should work)
- Verify your DNS is resolving through I2P
- Check WebRTC is disabled in Firefox console
- Always use HTTPS when available, even on .i2p sites
- Enable "HTTPS-only mode" in Firefox (default in this tool)
The Firefox profile disables auto-updates to prevent profile corruption. Keep your Firefox installation updated separately:
macOS:
brew upgrade firefoxLinux:
sudo apt update && sudo apt upgrade firefoxWindows: Check Firefox menu → Help → About Firefox
This tool does not modify I2Pd's network configuration. Review I2Pd's security settings at:
http://127.0.0.1:7070
Key settings to understand:
- Reachability - Set to highest level for better anonymity
- Tunnel Length - Default is secure; don't reduce unnecessarily
- Bandwidth Limits - Set appropriate for your network
The profile is stored at:
macOS/Linux:
~/.mozilla/firefox/[profile-name].default/
Windows:
%APPDATA%\Mozilla\Firefox\Profiles\[profile-name].default\
Keep this directory private and backed up securely.
I2Pd creates logs at:
- macOS:
/usr/local/var/log/i2pd/i2pd.log - Linux:
/var/log/i2pd/i2pd.logor~/.i2pd/i2pd.log - Windows:
%APPDATA%\i2pd\i2pd.logorC:\ProgramData\i2pd\i2pd.log
These logs may contain sensitive information. Review and secure appropriately.
If you discover a security vulnerability:
- DO NOT open a public issue on GitHub
- DO email details to: [email protected]
- Include:
- Vulnerability description
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Please allow reasonable time (30 days) for us to respond and develop a fix before public disclosure.
This tool uses minimal dependencies:
| Package | Version | Purpose | Security Notes |
|---|---|---|---|
| click | >=8.0.0 | CLI framework | Well-maintained, stable |
| rich | >=13.0.0 | Terminal UI | Pure Python, no native deps |
| requests | >=2.28.0 | HTTP requests | Standard, widely used |
| psutil | >=5.9.0 | Process monitoring | Stable, community-maintained |
All dependencies are pinned to minimum versions that include important security patches.
To check for vulnerabilities:
pip install safety
safety checkCheck for security updates:
pip install --upgrade i2p-easy-managerSubscribe to security advisories by watching the GitHub repository.
Critical security issues will be:
- Fixed immediately in a patch release
- Announced via GitHub releases
- Detailed in CHANGELOG.md
- Requires explicit permission to access Firefox profiles
- Homebrew-installed I2Pd runs as background service
- Check Activity Monitor for process status
- Requires
sudofor systemd I2Pd management - Consider SELinux/AppArmor profiles for Firefox
- Review filesystem permissions on profile directory
- Windows Defender may need exceptions for I2Pd
- Firefox may require admin privileges for profile creation
- Registry may contain sensitive information
This document applies to I2P Easy Manager v0.1.1
Last Updated: January 8, 2026