Enjoy secure browsing, streaming, and messaging with our unmatched blend of decentralized VPN, mixnet, and zero-knowledge payments.
Technology
- Elevated privacy with advanced onion encryption, data splitting, mixing, and concealment in cover traffic.
- Swift two-hop decentralized mode with onion encryption but no cover traffic.
- Inability to correlate IPs with network requests, by design. No backdoor or covert access to traffic and private data.
Unmatched privacy within a single application thanks to the unique blend of mixnet and decentralized VPN.
Zero-knowledge payment method, ensuring privacy and concealing user identity for transactions
Currently in testing at the time of this post with signup for free beta
A New Kind of Instant Messaging
Whether it's corporations or governments, digital surveillance today is widespread.
Tox is easy-to-use software that connects you with friends and family without anyone else listening in.
While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.
Share, freely and privately
Jami is a free/libre, end-to-end encrypted, and private communication software.
Features
-
Fast
Latency is reduced and transfer speeds are greatly increased thanks to the direct peer-to-peer connection. -
Autonomous
Users who are on the same local network can communicate with Jami even if they are disconnected from the internet. -
No personal information needs to be provided when creating an account.
-
Free
As in free beer AND as in freedom. -
Unlimited
Without restriction on file size, speed, bandwidth, features, number of accounts, storage or anything else. -
Private
All communications are peer-to-peer and end-to-end encrypted. -
Ad Free
There will never be advertising on Jami.
Quit Big Tech. Never look back.
Whether it's for an organization, a community, or a group chat with friends, Quiet lets you control all your data without running your own servers.
While apps like Slack, Discord, and Signal use central servers, Quiet syncs messages directly between a team’s devices, over Tor, with no server required.
Quiet is in beta and shouldn't be used for activities requiring security.
Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in alpha, Subgraph OS looks and feels like a modern desktop operating system.
Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful.
“Terms of Service; Didn't Read” (short: ToS;DR) is a project started in June 2012 to help fix the “biggest lie on the web”: almost no one really reads the terms of service we agree to all the time.
Provides a simple way to see those terms and conditions elements that companies like to sneak away in an terms of service agreement that scrolls to the end of the universe.
What is IPFilter Updater?
It’s a small Windows application that will download and update an ipfilter list for use in Bit Torrent clients.
What Bit Torrent clients are supported?
Currently uTorrent, BitTorrent and qBittorrent are supported out of the box, but you can also configure other applications to pick up the downloaded list.
What is an ipfilter?
An ipfilter list is a simple (but usually very large) list of addresses and ranges of malicious peers that will transmit junk data (i.e. anti-P2P) or peers that may be intrusive on your net privacy.
Why do I need an ipfilter?
For privacy and more reliable peers
Retroshare establish encrypted connections between you and your friends to create a network of computers, and provides various distributed services on top of it: forums, channels, chat, mail..
Retroshare is fully decentralized, and designed to provide maximum security and anonymity to its users beyond direct friends. Retroshare is entirely free and open-source software. It is available on Android, Linux, MacOS and Windows.
There are no hidden costs, no ads and no terms of service.
Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacyarchive.org. It's based on the Torarchive.org anonymity network, security-focused Linux Distribution Kicksecure™The Web ArchiveOnion Version , GNU/Linux and the principle of security by isolation. Whonix defeats common attacks while maintaining usability.
Whonix uses an extensively security reconfigured of the Debian base (Kicksecure™ Hardened) which is run inside multiple virtual machines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and IP leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input
MOFO Linux is an operating system organized around the purpose of defeating all methods of internet censorship and surveillance used by governments, corporations, schools, and internet service providers.
It is a tool created to empower people for exercising their rights to privacy, freedom of expression, association, and peaceful assembly.
These are universal human rights, not privileges to be metered out at the whims of any government; protected by the International Covenant on Civil and Political Rights and the Universal Declaration of Human Rights. Just and reasonable people respect them in daily life.
MOFO Linux gives you the power to unblock any media, at your discretion, clearing the way for you to read, write, watch, listen to, debate, or collaborate beyond the reach of Big Brother. In other words, you jump the barrier, find media, and interact with people. It does not matter what country or state you are in; MOFO Linux just works.
MOFO Linux is designed for easy usage on home PCs, laptop computers, or workstations, whether installed in internet cafes anywhere the world or on the most modest of home desktop machines. It is a collection of office, multimedia, web browsing, file sharing, and internet messaging applications assisted by a collection of tools for breaking through any censorship barriers. They do not all work 100% of the time, but there is always at least one tool which the authorities cannot block.
εxodus analyses Android applications. It looks for embedded trackers and lists them.
A tracker is a piece of software meant to collect data about you or what you do.
In a way, εxodus reports are a way of knowing what really are the ingredients of the cake you are eating. εxodus does not decompile applications, its analysis technique is entirely legal.
The εxodus website lets you:
- check an Android application report using the search engine
- analyse a new Android application by requesting analysis
- go further, providing a list of tools and things you can do to improve your privacy on your smartphone
In comparison to popular messaging applications like Telegram, WhatsApp and Signal, Speek is by far the most secure way to converse. Speek is serverless, stores no metadata, requires no ID or phone number and all the messages are encrypted and routed via the Tor network.
All messages are end-to-end encrypted. The Speek client is creating a Tor hidden service on the client PC. The message is then routed via the Tor onion network to the receiver. This makes it possible that the IP addresses are never public and the users can stay anonymous. The users are identified with public keys. Each user can share their public key with others to add them to the contacts list.
The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected
I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.
Orbot is a free VPN and proxy app that empowers other apps to use the internet more securely.
Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
Waterfox is a privacy-focused web browser that emphasizes speed, control, and privacy. It was one of the first widely distributed 64-bit browsers and quickly gained a loyal following. Initially focused on speed, Waterfox now also aims to be an ethical, user-oriented browser, striking a balance between privacy and usability. Here are some key features:
- Privacy Out of the Box: Waterfox comes with built-in tracking protection and Oblivious DNS, making it harder for ISPs to track your website connections.
- Private Tabs with Private Search: You can browse privately and anonymously within a private tab without opening a separate private window.
- Container Tabs: Organize your browsing by separating work, shopping, or personal activities using different container tabs.
- Data Privacy: Waterfox doesn't collect your data, and telemetry is disabled within the browser. Limited data collection ensures your browser stays up to date and secure.
- Compatibility: Waterfox supports Firefox add-ons and is compatible with Google Chrome and Opera extensions.
When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy.
With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there.
Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Adobe Flash, Google Chrome, Opera, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.
ClearURLs is an add-on based on the new WebExtensions technology and is optimized for Firefox and Chrome based browsers.
This extension will automatically remove tracking elements from URLs to help protect your privacy when browsing through the internet. For this purpose, we use a large catalog of rules, which is actively maintained by us and the community.
Many websites use tracking elements in the URL to mark your online activity. All that tracking code is not necessary for a website to be displayed or work correctly and can therefore be removed — that is exactly what ClearURLs does.
Features
- Removes tracking from URLs automatically in the background
- Blocks some common ad domains (optional)
- Has a built-in tool to clean up multiple URLs at once
- Supports redirection to the destination, without tracking services as a middleman
- Adds an entry to the context menu so that links can be copied quickly and cleanly
- Blocks hyperlink auditing, also known as ping tracking
- Prevents ETag tracking
- Prevents tracking injection over history API
- Prevents Google from rewriting the search results (prevents the insertion of tracking code)
- Prevents Yandex from rewriting the search results (prevents the insertion of tracking code)
PixelBlock is a Gmail extension that blocks people from tracking when you open their emails.
PixelBlock is an Gmail extension that blocks email tracking attempts used to detect when you open and read emails. PixelBlock displays a 'red eye' when it finds and blocks a tracking attempt inside of an email.
Arc is a web browser developed by The Browser Company that aims to reimagine how we use the internet. Here are some key points about Arc:
-
Anticipates Your Needs
Arc doesn't just meet your requirements; it anticipates them. It adapts to your browsing habits and preferences, making your online experience more intuitive and efficient. -
Clean and Calm Interface
Arc's design is clean and calm, providing a clutter-free browsing environment. It organizes everything you do online, whether it's work, study, or hobbies, within a single window using Spaces and Profiles. -
Privacy-Focused
Built from the ground up with privacy in mind, Arc ensures that your browsing activity remains private and secure. It doesn't track the sites you visit or your search queries. -
Unique Features
- Easel: Arc includes a scrapbook-style "easel" where you can organize and manage your web content.
- Boosts: This feature allows users to cosmetically redesign websites, similar to browser extensions.
- Spotlight-Like Search: Arc offers a search experience reminiscent of macOS's Spotlight search.
- Dock for Frequent Websites: The browser has a dock that houses your most frequently visited websites.
- Split-Screen Mode: You can use Arc's split-screen mode to manage multiple tabs efficiently.
-
Platform Availability: Arc is available for macOS, iOS, and Microsoft Windows, making it accessible across different devices².
Overall, Arc aims to create a calmer, more personal internet experience tailored to individual users' needs and preferences. If you're tired of the clutter and distractions in traditional browsers, Arc might be worth exploring.
PrivateBin is a minimalist, open source online pastebin where the server has zero knowledge of pasted data.
Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode.
-
As a server administrator you don't have to worry if your users post content that is considered illegal in your country. You have plausible deniability of any of the pastes content. If requested or enforced, you can delete any paste from your system.
-
Pastebin-like system to store text documents, code samples, etc.
-
Encryption of data sent to server.
-
Possibility to set a password which is required to read the paste. It further protects a paste and prevents people stumbling upon your paste's link from being able to read it without the password.