Sadie Mascis

Sadie Mascis

My name is Sadie. I have spent the past decade working in security, communications, and supporting the building of the Invisible Internet. I contribute to the I2P core distribution.
Nov
29
I2P Browsing Functions

I2P Browsing Functions

This post relates to using the I2P Java software and using the I2P in Private Browsing Mode Firefox extension. I2P
3 min read
Nov
29
Community Product Development: Can We Bridge the Funding and Adoption Gap For FOSS Tools?

Community Product Development: Can We Bridge the Funding and Adoption Gap For FOSS Tools?

Within the internet freedom community we often struggle with funding support for free-open source tools. Teams are often small, overworked,
4 min read
Nov
29
Meet Your Maintainer: A Conversation with I2P Outproxy Operators StormyCloud Inc.

Meet Your Maintainer: A Conversation with I2P Outproxy Operators StormyCloud Inc.

Who is StormyCloud Inc? Mission of StormyCloud Inc. To defend Internet access as a universal human right. By doing so,
4 min read
Nov
29
Meet Your Maintainer: DIVA.EXCHANGE

Meet Your Maintainer: DIVA.EXCHANGE

In this second instalment of Meet Your Maintainer, I reached out to Konrad from DIVA.EXCHANGE to talk about DIVA’
8 min read
Nov
29
Introducing I2P To Digital Trainers: Revealing Gaps In Usability and Onboarding

Introducing I2P To Digital Trainers: Revealing Gaps In Usability and Onboarding

In this last part of our interviews with the digital security trainers, we will share the impressions that people provided
3 min read
Nov
29
Trust Modelling: Trust Supports Adoption and Informs Standards For Future Privacy Tool  Development.

Trust Modelling: Trust Supports Adoption and Informs Standards For Future Privacy Tool Development.

We asked the Digital Security Trainers what makes them trust a privacy tool. We left the word trust open to
3 min read
Nov
29
Dear Privacy Tool Builders, I Just Need To Do My Work

Dear Privacy Tool Builders, I Just Need To Do My Work

This is the second part of a series where we share the insights from our community outreach earlier this year.
3 min read
Nov
29
Ask A Digital Security Trainer: The Process of Risk Assessment

Ask A Digital Security Trainer: The Process of Risk Assessment

As part of our sustainability and adoption work, the I2P Research and Usability Lab has reached out human rights defenders,
3 min read
May
27
About

About

Our goal is to support I2P network builders, participants and interoperability within the overlay network community. Terms All services listed