A New Kind of Instant Messaging
Whether it's corporations or governments, digital surveillance today is widespread.
Tox is easy-to-use software that connects you with friends and family without anyone else listening in.
While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.
Quit Big Tech. Never look back.
Whether it's for an organization, a community, or a group chat with friends, Quiet lets you control all your data without running your own servers.
While apps like Slack, Discord, and Signal use central servers, Quiet syncs messages directly between a team’s devices, over Tor, with no server required.
Quiet is in beta and shouldn't be used for activities requiring security.
Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacyarchive.org. It's based on the Torarchive.org anonymity network, security-focused Linux Distribution Kicksecure™The Web ArchiveOnion Version , GNU/Linux and the principle of security by isolation. Whonix defeats common attacks while maintaining usability.
Whonix uses an extensively security reconfigured of the Debian base (Kicksecure™ Hardened) which is run inside multiple virtual machines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and IP leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input
In comparison to popular messaging applications like Telegram, WhatsApp and Signal, Speek is by far the most secure way to converse. Speek is serverless, stores no metadata, requires no ID or phone number and all the messages are encrypted and routed via the Tor network.
All messages are end-to-end encrypted. The Speek client is creating a Tor hidden service on the client PC. The message is then routed via the Tor onion network to the receiver. This makes it possible that the IP addresses are never public and the users can stay anonymous. The users are identified with public keys. Each user can share their public key with others to add them to the contacts list.
The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected
I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.
Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online.
Orbot is a free VPN and proxy app that empowers other apps to use the internet more securely.
Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
Tails is a security-focused Linux distribution that leaves no trace on the computer it's used on.
It's designed to be run from a portable storage device, like a USB drive.
It includes a suite of applications for secure communications and helps to protect user's privacy and anonymity online.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.
-
no phone numbers
session accounts are completely anonymous -
no data breaches
Session doesn't collect date, so there is nothing to leak -
no footprints
Send messages through onion routing network -
censorship resistant
With no central point of failure, it is harder to shut Session down
Tribler is a research project of Delft University of Technology in the Netherlands.
Privacy using our Tor-inspired onion routing
Search and download torrents with less worries or censorship
Disclaimer
Do not put yourself in danger. Our anonymity is not yet mature.
Tribler does not protect you against spooks and government agencies.
We are a torrent client and aim to protect you against lawyer-based attacks and censorship. With help from many volunteers we are continuously evolving and improving.