P2PVPN icon
P2PVPN icon

P2PVPN

 16 likes

P2PVPN creates a virtual private network for you which behaves like a physical network (e.g. your network at home). But instead of using an Ethernet cable to connect computers P2PVPN uses secure Internet connections.

P2PVPN screenshot 1

License model

  • FreeOpen Source

Platforms

  • Windows
  • Linux
Discontinued

The project is no longer developed. Last version, 0.8, released in December 2010, can be still downloaded from SourceForge. For a more up-to-date version, you can use this fork: https://gitlab.com/Monsterovich/p2pvpn

  No rating
16 likes
0comments
0 news articles

Features

Suggest and vote on features
  1.  Ad-free
  2.  Virtual LAN
  3.  No Tracking
  4.  End-to-End Encryption
  5.  Dark Mode
  6.  Decentralized
  7.  No registration required
  8.  Lightweight

P2PVPN News & Activities

Highlights All activities

Recent News

No news, maybe you know any news worth sharing?
Share a News Tip

Recent activities

Show all activities

P2PVPN information

  • Developed by

    Wolfgang Ginolas
  • Licensing

    Open Source and Free product.
  • Alternatives

    28 alternatives listed
  • Supported Languages

    • English

AlternativeTo Category

Security & Privacy

Our users have written 0 comments and reviews about P2PVPN, and it has gotten 16 likes

P2PVPN was added to AlternativeTo by clifweb on May 28, 2011 and this page was last updated Oct 16, 2023.
No comments or reviews, maybe you want to be first?
Post comment/review

What is P2PVPN?

P2PVPN creates a virtual private network for you which behaves like a physical network (e.g. your network at home). But instead of using an Ethernet cable to connect computers P2PVPN uses secure Internet connections. Things you normally do with your LAN (share files, play games etc.) you can also do with P2PVPN with people around the world.

Features

Network

  • Decentralized peer-to-peer network
  • Peers route traffic for other peers
  • Find other peers using a BitTorrent tracker

Security

  • Only people you invited may connect to your network
  • Uses RSA (1024 Bit) to authenticate peers
  • Uses AES (128 Bit) to encryption your traffic

Official Links