Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
- - Tor is the most popular Windows, Mac & Linux alternative to Phantom.
- - Tor is the most popular Open Source & free alternative to Phantom.
The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.
- - I2P is the most popular Android alternative to Phantom.
Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in...
Snowflake is a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers.
Snowflake Tor Features
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing.
FreePN is the first completely free, completely open network dedicated to protecting your online privacy. Joining the network is easy: just download and install the app. No accounts, no registration, no setup. Once you start the app, you're already protected.
The website is unavailable.
A proof-of-concept scalable IPv6 meshnet, featuring end-to-end encryption, a unique spanning tree routing algorithm and aiming to implement novel backpressure routing metrics.
Cjdns is a networking protocol and reference implementation, founded on the ideology that networks should be easy to set up, protocols should scale up smoothly, and security should be ubiquitous.
Bitmask is an EXPERIMENTAL open source application to provide easy and secure encrypted communication. You can choose among several different service providers or start your own. Currently, it supports encrypted internet (VPN) and encrypted email.
- - Bitmask is the most popular Android Tablet alternative to Phantom.
I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.
i2pd (I2P Daemon) Features
OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It allows users to anonymously access Internet services. It transmits any kind of IPv6-based data transparently through the TOR network on a location hidden basis.
The program seems to be no longer updated. Last version, 1.0b, released in April 2015, can be downloaded from this archived version of the now closed website: https://archive.is/pdGHX