Tor Alternatives
Tor is described as 'is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security' and is a leading anonymizing network in the security & privacy category. There are more than 50 alternatives to Tor for a variety of platforms, including Windows, Mac, Linux, Android and BSD. The best alternative is Tor Browser, which is both free and Open Source. Other great apps like Tor are I2P, Orbot, Freenet and ZeroNet.
Tor alternatives are mainly Anonymizing Networks but may also be VPN Services or Web Browsers. Filter by these if you want a narrower list of alternatives or looking for a specific functionality of Tor.Tor Browser
Do you think this is a good alternative?YesNo- Free • Open Source
- Web Browser
245 alternatives to Tor Browser- Mac
- Windows
- Linux
- Android
- Android Tablet
- OpenBSD
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning...
Tor Browser Features
Tor Browser vs Tor opinions
anyone can use it even in secure and encrypted network.
0very good.i like you tor
0Tor Browser is a browser that connects to Tor, therefore not a proper alternative.
7RemovedUserAs it is a Tor client rather than an alternative darknet or distributed network
0somepeterTor Browser is (guess what) the browser for Tor. It makes as much sense to compare them as to compare Firefox and HTTP.
1I2P
Do you think this is a good alternative?YesNo- Free • Open Source
- Anonymizing Network
43 alternatives to I2P- Mac
- Windows
- Linux
- Android
- BSD
The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.
I2P Features
I2P vs Tor opinions
Both access networks that are otherwise inaccessible.
0daniellmesquitaIt is very more anonymous than Tor, and Tor is not even really anonymous.
-9Orbot
Do you think this is a good alternative?YesNo- Free • Open Source
- VPN Service
- Anonymizing Network
- Proxy Service
17 alternatives to Orbot- Android
- iPhone
- Android Tablet
- iPad
- Mac
Orbot is a freely licensed open-source application developed for the Android platform. It acts as a front-end to the Tor binary application, and also provides an HTTP Proxy for connecting web browsers and other HTTP client applications into the Tor SOCKS interface.
Orbot vs Tor opinions
Basically the same for Android.
1crazypens30Orbot, for what it is, is the most similar to the desktop Tor client. In fact, it has several advantages over the desktop version - it's easy to configure bridges and its VPN all from the same console (even though the VPN is in beta at this point). You can also easily configure which nodes to include or exclude. It does occasionally have security leaks, but these have improved in later versions.
-1it's just the android version of tor
1Just your way to go in case of needing to reach Tor on mobile. The others are, even if alternatives, surely not as good as this for mobile.
0Freenet
Do you think this is a good alternative?YesNo- Free • Open Source
- Anonymizing Network
51 alternatives to Freenet- Mac
- Windows
- Linux
- BSD
Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in...
Freenet Features
Freenet vs Tor opinions
Both have a network that is otherwise inaccessible.
1ZeroNet
Do you think this is a good alternative?YesNo- Free • Open Source
- Anonymizing Network
25 alternatives to ZeroNet- Mac
- Windows
- Linux
- Online
- gevent
- Self-Hosted
- NameCoin
- Python
- JavaScript
ZeroNet uses cryptography (Bitcoin library) and BitTorrent DHT (centralized trackers) to build a distributed censorship-resistant network.
ZeroNet Features
DiscontinuedThe last release is from September 2019.
ZeroNet vs Tor opinions
Closest to the decentralized part of Tor.
-1Shadowsocks
Do you think this is a good alternative?YesNo- Free • Open Source
- VPN Service
- Anonymizing Network
- Proxy Service
167 alternatives to Shadowsocks- Mac
- Windows
- Linux
- Android
- Android Tablet
- F-Droid
- iPhone
- iPad
A fast tunnel proxy that helps you bypass firewalls.
Shadowsocks Features
Shadowsocks vs Tor opinions
Snowflake Tor
Do you think this is a good alternative?YesNo- Free • Open Source
- VPN Service
- Anonymizing Network
212 alternatives to Snowflake Tor- Google Chrome
- Firefox
Snowflake is a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers.
Snowflake Tor Features
GNUnet
Do you think this is a good alternative?YesNo- Free • Open Source
- Anonymizing Network
52 alternatives to GNUnet- Mac
- Windows
- Linux
- BSD
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing.
GNUnet Features
GNUnet vs Tor opinions
Yggdrasil
Do you think this is a good alternative?YesNo- Free • Open Source
199 alternatives to Yggdrasil- Mac
- Windows
- Linux
- Android
- BSD
A proof-of-concept scalable IPv6 meshnet, featuring end-to-end encryption, a unique spanning tree routing algorithm and aiming to implement novel backpressure routing metrics.
Yggdrasil Features
cjdns
Do you think this is a good alternative?YesNo- Free • Open Source
- Anonymizing Network
29 alternatives to cjdns- Mac
- Linux
- BSD
Cjdns is a networking protocol and reference implementation, founded on the ideology that networks should be easy to set up, protocols should scale up smoothly, and security should be ubiquitous.