1. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning...
  2. Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.


  3. OpenVPN provides flexible VPN solutions to secure your data communications, whether it's for Internet privacy, remote access for employees, securing IoT, or for networking Cloud data centers.
    show more
  4. Why use VPN SECURITY Our secure VPN sends your internet traffic through an encrypted VPN tunnel, so your passwords and confidential data stay safe, even over public or untrusted Internet connections. PRIVACY
    No screenshots yet
  5. The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.
    show more
  6. Orbot is an open source Tor Proxy App for Android Phones. If the phone is rooted, it can even transparently route all phone internet traffic through the Tor network.
  7. A secure socks5 proxy, designed to protect your Internet traffic. - Super Fast Bleeding edge techniques using Asynchronous I/O and Event-driven programming. - Flexible Encryption Secured with industry level encryption algorithm. Flexible to support custom algorithms.
    • FreemiumProprietary
    • Mac
    • Windows
    • Linux
    • Online
    • Android
    • iPhone
    • Android Tablet
    • iPad
    • Google Chrome
    Hotspot Shield encrypts your connection and doesn't log any data that could be tied to you, shielding your identity and info from hackers and cyber predators.
    • FreemiumProprietary
    • Mac
    • Windows
    • Online
    • Android
    • iPhone
    • Chrome OS
    • Android Tablet
    • iPad
    • Microsoft Edge
    • Vivaldi Browser
    • Google Chrome
    • Maxthon
    • Yandex.Browser
    • Opera
    • Chromium
    • Firefox
    ZenMate is an easy to use Browser plugin that provides a VPN solution - encrypting all your browser traffic and routing it through our ZenMate cloud to provide a secure and private browsing experience. Forget internet restrictions!
    show more
    • FreemiumProprietary
    • Windows
    • Android
    • iPhone
    • Android Tablet
    • iPad
    • Vivaldi Browser
    • Google Chrome
    • Yandex.Browser
    • Opera
    • Chromium
    betternet is the easiest way to connect to the web without censor or restrictions. An unlimited FREE VPN with no ads, no registration, no b******t; we just protect your privacy and identity. That’s it!
    show more
  8. CyberGhost VPN allows you to surf the Internet freely, as if in disguise, regardless of the type of application you use and from where you log in.
    No screenshots yet
  9. This is an all-in-one solution for safe, anonymous and unlimited access to web sources from anywhere around the globe. The app is available on iOS, Android, Mac, Windows, Windows Phone and Linux.
  10. AirVPN is a VPN based on OpenVPN and operated by activists and hacktivists in defence of net neutrality, privacy and against censorship.
    No screenshots yet
  11. Freegate is an anti-censorship software for secure and fast Internet access. It was developed and maintained by Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention operation.
  12. UltraSurf is a free software which enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. Users in countries without internet censorship also use it to protect their internet privacy and security.

    Warning

    This app is suspected of malicious behavior, though these accusations are in dispute. The software allegedly connects to websites of financial and government institutions, and uses the PC for attacks against them. It disables SSL certificate checks and allows man-in-the-middle attacks to steal authentication credentials. It hooks into the browser and uses suspicious compression to hide parts of the program.