The Subgraph OS utilizes the Tor Network. However, Subgraph OS mainly focuses on the usability. A Canadian based security firm refers to this OS as an “Adversary Resistant” operating system. The OS itself is designed to aid in reducing the number of attacks on users, if not completely erase the attacks per user. The OS proclaims to even possess a built-in email client, which is encrypted, as well as built-in disk encryption and firewall. Alongside with these encryption services, we can also see the advantages of limiting the ability of malicious files and data to be formatted. The major downside to this OS is that it is a permanent OS, meaning you cannot boot from a live USB or DVD.
I2P is a completely anonymous peer-to-peer communication layer. This utilizes custom built-in tools. Just outside of going to complete OS (such as Tails), I2P is an installation you can use on your Windows Desktop and is a complete, safe and secure alternative to the Tor Network. This software is designed and optimized with security in mind. Completed with hidden services, we see a much faster response time than we did with Tor. However, unlike Tor, the peers are actually selected based upon a continuous ranking and profiling. Unlike Tor, which utilizes bidirectional circuits, I2P uses unidirectional tunnels. This makes your number of nodes doubled (A node has to compromise itself to get the same information).