AlternativeTo Logo

Onion.ly Alternatives

Onion.ly is described as 'Tor / I2P in proxy and gateway. Just like tor2web, access .onion and .i2p domains without running Tor or I2P software' and is an website in the security & privacy category. There are more than 10 alternatives to Onion.ly, not only websites but also apps for a variety of platforms, including Windows, Linux, Mac, Android and BSD. The best alternative is Tor Browser, which is both free and Open Source. Other great sites and apps similar to Onion.ly are Tor, I2P, Freenet and Orbot.

Onion.ly alternatives are mainly Anonymizing Networks but may also be VPN Services or Web Browsers. Filter by these if you want a narrower list of alternatives or looking for a specific functionality of Onion.ly.
This page was last updated
  • FreeProprietary
  • Online

Tor / I2P in proxy and gateway. Just like tor2web, access .onion and .i2p domains without running Tor or I2P software.

Learn more about Onion.ly

  1. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning...

    ⚫︎ Privacy focusedTor Browser is considered a privacy friendly alternative.
    ⚫︎ Built-in VPNTor Browser has a built-in VPN feature that enhances your privacy and allows you to browse the web from anywhere.
    ⚫︎ Block TrackersTor Browser has a feature to block trackers from tracking you.
    ⚫︎ PortableTor Browser can be used from a USB stick or similar with no prior installation.
    Suggest and vote on features
    Screenshot
  2. Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

    ⚫︎ Privacy focusedTor is considered a privacy friendly alternative.
    ⚫︎ PortableTor can be used from a USB stick or similar with no prior installation.
    Suggest and vote on features
    Screenshot


  3. The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.

    ⚫︎ DecentralizedI2P is based on a decentralized infrastructure with no single entity controlling it.
    Suggest and vote on features
    Screenshot
  4. Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship.

    ⚫︎ DecentralizedFreenet is based on a decentralized infrastructure with no single entity controlling it.
    Suggest and vote on features
    Screenshot
  5. Orbot icon

    Orbot

    • FreeOpen Source
    • Android
    • iPhone
    • Android Tablet
    • iPad

    Orbot is an open source Tor Proxy App for Android Phones. If the phone is rooted, it can even transparently route all phone internet traffic through the Tor network.

    ⚫︎ Privacy focusedOrbot is considered a privacy friendly alternative.
    Suggest and vote on features
    Screenshot


  6. Snowflake Tor icon

    Snowflake Tor

    • FreeOpen Source
    • Google Chrome
    • Firefox

    Snowflake is a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers.

    ⚫︎ Privacy focusedSnowflake Tor is considered a privacy friendly alternative.
    ⚫︎ DecentralizedSnowflake Tor is based on a decentralized infrastructure with no single entity controlling it.
    Suggest and vote on features
    Screenshot
  7. GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing.

    ⚫︎ DecentralizedGNUnet is based on a decentralized infrastructure with no single entity controlling it.
    Suggest and vote on features
    Besides command line tools, GNUnet provides a graphical user interface: gnunet-gtk. Here are some screenshots of gnunet-gtk and its features and ports.
  8. FreePN is the first completely free, completely open network dedicated to protecting your online privacy. Joining the network is easy: just download and install the app. No accounts, no registration, no setup. Once you start the app, you're already protected.

    ⚫︎ Privacy focusedFreePN is considered a privacy friendly alternative.
    ⚫︎ No registration requiredYou can use most of the features in FreePN without registration.
    ⚫︎ No TrackingFreePN will not track or use your personal data.
    ⚫︎ DecentralizedFreePN is based on a decentralized infrastructure with no single entity controlling it.
    ⚫︎ AES-256 EncryptionFreePN has AES-256 Encryption, i.e. very strong security.
    ⚫︎ LightweightFreePN consumes less device resources compared to similar apps.
    ⚫︎ End-to-End EncryptionFreePN has E2E Encryption, for entire or parts of the app.
    ⚫︎ No LogsFreePN doesn't keep any logs of your activities.
    Suggest and vote on features
    No screenshots yet
  9. Yggdrasil

    • FreeOpen Source
    • Mac
    • Windows
    • Linux
    • BSD

    A proof-of-concept scalable IPv6 meshnet, featuring end-to-end encryption, a unique spanning tree routing algorithm and aiming to implement novel backpressure routing metrics.

    ⚫︎ DecentralizedYggdrasil is based on a decentralized infrastructure with no single entity controlling it.
    ⚫︎ LightweightYggdrasil consumes less device resources compared to similar apps.
    ⚫︎ End-to-End EncryptionYggdrasil has E2E Encryption, for entire or parts of the app.
    Suggest and vote on features
    No screenshots yet
  10. i2pd (I2P Daemon) icon

    i2pd (I2P Daemon)

    • FreeOpen Source
    • Mac
    • Windows
    • Linux
    • Android
    • Raspberry Pi
    • C++
    • I2P

    I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.

    Suggest and vote on features
    No screenshots yet
Showing 10 of 14 alternatives