I2P 2.11.0 Ships Post-Quantum Crypto After Botnet Siege

A botnet that broke DDoS records at 31.4 terabits per second accidentally crippled I2P's anonymity network while trying to use it as a backup command infrastructure, and the developers responded with post-quantum cryptography enabled by default.

I2P 2.11.0 Ships Post-Quantum Crypto After Botnet Siege

On February 3rd, 2026, users on I2P's GitHub page started reporting mass connection failures. Tens of thousands of unknown routers were flooding the network, and legitimate nodes could barely communicate. One user reported their physical router freezing when connections exceeded 60,000. The Invisible Internet Project a decentralized anonymity network that normally runs on 15,000 to 20,000 devices daily was getting hammered by something orders of magnitude larger than itself.

The Kimwolf botnet caused it a massive IoT infection that surfaced in late 2025 and quickly compromised millions of poorly secured devices like TV streaming boxes, digital picture frames, and consumer routers. The same day users started complaining, the people running Kimwolf posted on their Discord that they'd accidentally disrupted I2P after trying to join 700,000 infected bots as network nodes. I2P's Wikipedia page lists its historical network size at around 55,000 computers, and the actual daily active count sits between 15,000 and 20,000. They shoved 700,000 fake nodes into that.

Network Visualization
SYBIL ATTACK SIMULATION
One entity creates hundreds of thousands of fake identities to overwhelm a decentralized network. The Kimwolf attacker flooded I2P with 700,000+ Sybil nodes against a network of roughly 18,000 legitimate routers.
Legitimate Nodes
~18,000
Hostile Nodes
0
Network Status
Healthy
Legitimate
Sybil (Hostile)
Waiting to start... 0:00 / 0:09
Healthy Network Attack Begins Overwhelmed Recovery

Security researchers call this a Sybil attack one entity creates enough fake identities to destabilize the whole network. I2P's own threat model documentation has always acknowledged that the network's modest size makes these attacks easier than they should be, and Kimwolf proved that in real time.

The botnet's operators weren't trying to destroy I2P on purpose, though. According to Benjamin Brundage of Synthient, they were experimenting with using I2P and Tor as backup command-and-control infrastructure to survive takedown attempts against their primary servers. This is the same Kimwolf/Aisuru operation that launched a record-setting 31.4 terabit-per-second DDoS attack on December 19, 2025 — a campaign Cloudflare named "The Night Before Christmas" after it pummeled telecom providers with 902 hyper-volumetric attacks over 17 days. When these operators casually tried to convert a privacy network into their fallback infrastructure, they brought that same scale of destruction with them.

Ok so here's where the I2P team earns respect. Six days after the Sybil attack started — while the network was still operating at roughly 50% capacity — they released version 2.11.0 on February 9th loaded with significantly more than spam mitigations.

Post-quantum cryptography is now enabled by default at the ratchet layer. The implementation uses a hybrid ML-KEM+X25519 scheme following the NIST FIPS 203 standard — the development pipeline started with the 2.9.0 release in June 2025, went to opt-in beta in 2.10.0 in September 2025, and landed as the default in 2.11.0.

From what I found, this makes I2P one of the first production anonymity networks to ship post-quantum encryption to all users by default. They went with ML-KEM-768 because it meets the minimum NIST security category 2 required for hybrid protocols while ML-KEM-512 falls below that threshold. The tradeoff worth understanding: hybrid key exchange increases New Session Message size significantly, and those larger messages need to be fragmented into multiple 1024-byte tunnel chunks, which could reduce delivery reliability. The developers compensated by deferring the streaming payload until the first Existing Session Message instead of using 0-RTT delivery, sacrificing one round trip of latency for stronger forward secrecy.

Classical vs Post-Quantum Key Exchange
How I2P 2.11.0 defends against harvest-now-decrypt-later attacks
X25519 (Classical)
VULNERABLE
Public key: 32 bytes
Shared secret: 32 bytes
PQ-safe: NO
ML-KEM-768 + X25519
QUANTUM-SAFE
ML-KEM pubkey: 1,184 bytes
X25519 pubkey: 32 bytes
Tunnel fragments: 2 chunks
PQ-safe: YES
+1 RTT latency for quantum resistance

The first round of mitigations against the ongoing spam and Sybil attacks shipped in this release, with additional defenses still in development. The commit history shows the specific hardening: increased SSU2 IP table sizes, tweaked NetDB router info drop probabilities, general router robustness fixes, and increased per-hop TunnelDataMessage expiration.

I2P now requires Java 17 or later and runs on Jetty 12, which the team telegraphed two releases in advance — the 2.9.0 release notes explicitly warned that "in two releases, at 2.11.0, I2P will require Java 17." Jetty 12 also moves the codebase from the legacy javax.servlet namespace to jakarta.servlet, a one-time migration pain for plugin developers that brings the project current with the modern Java ecosystem. Smaller changes: wrapper max memory bumped to 512 MB for new installs, and the console gained an option to disable notification bubbles.

Proposal 163 also landed, bringing Datagram2 and Datagram3 support to the SAMv3 API. Datagram2 adds replay resistance and offline signature support by including the target hash in the signature function, which prevents replay attacks across destinations. Datagram3 strips signatures entirely for applications that handle authentication at a higher layer. The practical payoff is that i2psnark can now do bittorrent UDP announces over these new formats, building on the UDP tracker support added in 2.10.0 to reduce the network's torrent tracker overhead.

Kimwolf, meanwhile, is collapsing from the inside. According to Brundage, the operators alienated some of their more competent developers, and the resulting incompetence caused the botnet to shed more than 600,000 infected systems. Security researchers null-routed over 550 Kimwolf and Aisuru command-and-control servers in January 2026, and Brundage's assessment was direct: "the botnet's numbers are dropping significantly now, and they don't seem to know what they're doing."

KIMWOLF BOTNET COLLAPSE
January – February 2026
Infected Devices
2,000,000
↓ 600,000 lost
C2 Servers Active
550
ALL NULL-ROUTED
I2P Network Health
50%
↑ Recovering
C2 Server Infrastructure — 550 active
NULL-ROUTED

Lance James — founder of Unit 221B and the creator of I2P's predecessor IIP back in 2001 — confirmed the network should stabilize as 2.11.0 rolls out across the user base. The release is available now for PPA, Debian repos, and new installs, with Android to follow. If you're running an I2P router, update. The mitigations only protect you if you're on the current version, and the network just absorbed a 700,000-node Sybil attack from one of the largest botnets ever documented.

I2P has been running since 2003, growing from 25,795 nodes in January 2019 to 72,653 in April 2025 before Kimwolf temporarily cratered it. A volunteer dev team maintained a 13-week release cycle through all of it. Their response to the largest Sybil attack in the project's 23-year history was to ship quantum-resistant encryption enabled by default, six days later, while the network was still half-broken.

Kimwolf vs I2P — Attack Timeline
Late 2025 — February 2026
Late 2025
Kimwolf botnet emerges
Infects millions of IoT devices — TV boxes, picture frames, routers. Quickly becomes one of the largest botnets ever documented.
Emerging Threat
December 19, 2025
31.4 Tbps DDoS record
Kimwolf/Aisuru launches "Night Before Christmas" campaign against telecom providers. 902 hyper-volumetric attacks over 17 days.
Record Broken
January 2026
550+ C2 servers null-routed
Security researchers take down over 550 Kimwolf/Aisuru command-and-control servers. Operators begin looking for fallback infrastructure.
Disruption
February 3, 2026
700K bots flood I2P network
Kimwolf operators attempt to join 700,000 infected devices as I2P nodes. Network drops to ~50% capacity. Users report frozen routers at 60,000+ connections.
Sybil Attack
February 3, 2026
Kimwolf admits "accidental" disruption
Operators post on Discord acknowledging they accidentally broke I2P. Their goal was backup C2, not network destruction.
Disclosure
February 9, 2026
I2P 2.11.0 ships
Six days after the attack, I2P releases 2.11.0 with spam mitigations, post-quantum crypto enabled by default, Jetty 12, and Java 17 requirement.
Release
February 2026
Kimwolf loses 600K+ bots
After alienating key developers, botnet operators make critical mistakes. Numbers drop by over 600,000 infected systems. Network conditions improving.
Botnet Decline
I2P 2.11.0 Knowledge Check
Test your understanding of the Kimwolf attack and I2P's response
Progress 0/10 answered
Question 1
What type of attack did the Kimwolf botnet execute against the I2P network?
Question 2
How many infected devices did Kimwolf attempt to join as I2P nodes?
Question 3
What post-quantum cryptographic scheme does I2P 2.11.0 enable by default?
Question 4
Why did the Kimwolf operators try to use I2P as infrastructure?
Question 5
What is the minimum Java version now required to run I2P 2.11.0?
Question 6
What record did the Kimwolf/Aisuru botnet set in December 2025?
Question 7
What do the new Datagram2 and Datagram3 formats (Proposal 163) add to I2P?
Question 8
Who originally created the I2P project?
Question 9
What capacity was the I2P network operating at following the Kimwolf attack?
Question 10
Why did the I2P team choose ML-KEM-768 over ML-KEM-512 for the hybrid PQ scheme?
0/10
Your Score
0
Correct
0
Incorrect
0
Unanswered
Coins by Cryptorank