Robert (P2P Software)
|This article relies on references to primary sources. (January 2012)|
|Written in||Python, wxPython|
|License||Free, open source: GPL|
|Website||inside the I2P network - bob.i2p/Robert.html; using an I2P inproxy - bob.i2p.to/Robert.html|
Robert is a file sharing application that relies upon the security and encryption of peers and tunnels inside of I2P. The software uses torrents or a distribution method similar but not compatible to [[magnet:]] links, labeled maggot: links (this is intended as a pun on magnet links). Robert is free and open source and is published by Sponge, an active programmer associated with I2P. New versions are released throughout each month. Robert features a minimalist web browser known as seaweed, intended to allow the safe browsing of eepsites, with any insecure content removed. All connections in Robert are run natively through I2P, so there is no chance of user misconfiguration revealing anything about the user.
Robert has a beta and a stable software package. Robert relies on I2P, Python 2.7.1+, and wxPython 220.127.116.11+. Robert can also interact with Seedless, which is an I2P port of neodatis ODB, ported by sponge. This allows Robert to browse and download torrent files from the seedless database, which is totally decentralised. Seedless can also be used to locate peers, without using either a tracker or DHT. This feature was initially added due to the (then) lack of DHT support in i2psnark.
Robert provides BitTorrent functionality for use within the I2P network. Each peer relies on the user being able to access the I2P network with a web browser to download the .torrent file(s) or maggot: links. Users cannot connect to non-I2P torrents or peers from within I2P, nor can they connect to I2P torrents or peers from outside I2P.
- Other machines using I2P that are connected to each other in the network. Each peer shares the routing and forwarding of encrypted packets.
- Every ten minutes, a connection is established between one peer and another. Data to and from peers, along with data for other users, passes through these tunnels, and are forwarded so that the packets eventually reach their final destination.