Cost / License
- Freemium (Pay once)
- Open Source
Platforms
- Online
- JSON
- JavaScript
- Go (Programming Language)

I2P is described as 'The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P' and is a very popular anonymizing network in the security & privacy category. There are more than 25 alternatives to I2P for a variety of platforms, including Windows, Linux, Mac, Android and iPhone apps. The best I2P alternative is Tor, which is both free and Open Source. Other great apps like I2P are Matrix, Hyphanet, Snowflake Tor and IPFS.

A graphical app to provide a connection through TOR and sets up proxy in user session, so you don't have to mess up with TOR on your system anymore.


A post-Snowden VPN built on anonymity and security. Service requires you to think and have general understanding of software/networking setups. Intermediate level knowledge.
Undetectable VPN for ordinary users and experts. VpnHood is a solution to bypass Advanced Firewall and can circumvent deep packet inspection.



Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor software and will...


Tor / I2P in proxy and gateway. Just like tor2web, access .onion and .i2p domains without running Tor or I2P software.
IPFS Companion harnesses the power of your locally running IPFS node (either through the IPFS Desktop app or the command-line daemon) directly inside your favorite Chromium-based or Firefox browser, enabling support for ipfs:// addresses, redirecting content-addressed websites...




This project was created in order to support a new internet. One that is more open, free, and censorship-resistant in comparison to the old internet. An internet that eventually wouldn't need to rely on telecom towers, an outdated grid, or all these other "old...




Demonsaw is the next leap in the evolution of a free Internet, and the debut of social cryptography. Demonsaw is designed to protect your anonymity and hide what you're sharing.

Xor Patch applied to OpenVPN to obfuscate that you are using OpenVPN. This helps your bypass work/school or geographic restrictions (i.e. Great Firewall of China).
The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind:
Supports both bittorrent protocol and a friend-to-friend version of the same protocol which in most situations makes you anonymous.
