Self-Contained Anonymizing Networks offers complete online privacy and data protection through its self-contained networks. Our platform is designed for users who value anonymity, security, and freedom on the internet. Explore the internet without fear of tracking, censorship, or data breaches. Self-contained networks ensure the protection of your online identity and data.
Tor, short for The Onion Router, is for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than six thousand relays, for concealing a user's location and usage from anyone conducting network surveillance or traffic analysis.
Uses Oxen Service Nodes (also used by Session) as routers to safeguard user privacy and anonymity.
The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by end-to-end encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world.
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.
Peer-to-peer communication and file sharing app based on a friend-to-friend network built on GNU Privacy Guard (GPG). Optionally, peers may communicate certificates and IP addresses to and from their friends.
The InterPlanetary File System (IPFS) is a protocol and peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting all computing devices
For decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.
Privacy Friendly software is crucial in the digital era where privacy and security are at risk. With quality self-contained anonymizing networks such as Tor, you can be sure to find a comprehensive solution to ensure user privacy and security.
No registration or account needed. 450+ coins and tokens are available for quick and easy exchanges. Data privacy and security is a top priority for StealthEX, all swaps are non-custodial.
Privacy tools listed on this page are all open-source unless marked otherwise: Criteria.