Tor Alternatives
Tor is described as 'is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security' and is a leading anonymizing network in the security & privacy category. There are more than 50 alternatives to Tor for a variety of platforms, including Windows, Linux, Mac, Android and BSD. The best alternative is I2P, which is both free and Open Source. Other great apps like Tor are Orbot, Freenet, ZeroNet and Shadowsocks.
Tor is mainly a Anonymizing Network but alternatives to it may also be VPN Services or Anonymous Proxy Apps. Filter by these if you want a narrower list of alternatives or looking for a specific functionality of Tor.- The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.
- Free • Open Source
- Mac
- Windows
- Linux
- Android
- BSD
I2P vs Tor opinions
Both access networks that are otherwise inaccessible.daniellmesquita It is very more anonymous than Tor, and Tor is not even really anonymous. - Orbot is an open source Tor Proxy App for Android Phones. If the phone is rooted, it can even transparently route all phone internet traffic through the Tor network.
- Free • Open Source
- Android
- iPhone
- Android Tablet
- iPad
Orbot vs Tor opinions
Basically the same for Android.it's just the android version of torJust your way to go in case of needing to reach Tor on mobile. The others are, even if alternatives, surely not as good as this for mobile.crazypens30 Orbot, for what it is, is the most similar to the desktop Tor client. In fact, it has several advantages over the desktop version - it's easy to configure bridges and its VPN all from the same console (even though the VPN is in beta at this point). You can also easily configure which nodes to include or exclude. It does occasionally have security leaks, but these have improved in later versions. - Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship.
Freenet vs Tor opinions
Both have a network that is otherwise inaccessible. - ZeroNet uses cryptography (Bitcoin library) and BitTorrent DHT (centralized trackers) to build a distributed censorship-resistant network.
- Free • Open Source
- Mac
- Windows
- Linux
- Online
- gevent
- Self-Hosted
- NameCoin
- Python
- JavaScript
Discontinued
The last release is from September 2019.
ZeroNet vs Tor opinions
Closest to the decentralized part of Tor. - A fast tunnel proxy that helps you bypass firewalls.
- Free • Open Source
- Mac
- Windows
- Linux
- Android
- iPhone
- Android Tablet
- iPad
- F-Droid
- GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing.
- Snowflake is a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers.
- Free • Open Source
- Google Chrome
- Firefox
- Cjdns is a networking protocol and reference implementation, founded on the ideology that networks should be easy to set up, protocols should scale up smoothly, and security should be ubiquitous.
- Free • Open Source
- Mac
- Linux
- BSD
- Freegate is an anti-censorship software for secure and fast Internet access. It was developed and maintained by Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention operation.
- Free • Proprietary
- Windows
- Wine
Warning
The installer is detected as malicious by some antiviruses: https://www.virustotal.com/gui/file/20017fd064a42e743ecb6f6fd5b8b60efc21e7f3979b07fcd23a811514f23111
- I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.
- Free • Open Source
- Mac
- Windows
- Linux
- Android
- Raspberry Pi
- C++
- I2P
No screenshots yet