TopAlter.com

i2pd (I2P Daemon) Alternatives

i2pd (I2P Daemon) Alternatives

i2pd (I2P Daemon)

I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.
I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers).
I2P allows people from all around the world to communicate and share information without restrictions.

Best i2pd (I2P Daemon) Alternatives for Android

Want another awesome i2pd (I2P Daemon) alternative? Look no further. We researched the top alternatives and found several new i2pd (I2P Daemon) alternatives that work with your platform or device. If you want even more options, we've also reviewed top i2pd (I2P Daemon)-like software for your Mac, Windows PC, Android phone/tablet, Linux computer, or iPhone.

OpenVPN

OpenVPN

FreeOpen SourceWindowsLinuxAndroidiPhoneAndroid TabletiPadSelf-HostedCloudron

OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and...

Features:

  • Cisco AnyConnect
  • Linux
  • Security focused
  • Surf Anonymously
  • VPN
  • Anonymity
  • Encrypted VPN
  • Keepass integration
  • OS deployment
  • Privacy focused
  • Private repositories
  • Voice chat
  • VPN
Tor Browser

Tor Browser

FreeOpen SourceMacWindowsLinuxAndroidOpenBSD

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody...

Features:

  • Anonymity
  • Privacy focused
  • Security & Privacy
  • Web Browsers Based on Firefox
  • Privacy Protected
  • Anticensorship
  • Built-in VPN
  • Surf Anonymously
  • Built-in Ad-blocker
  • Embedded debugger
  • Forces encrypted connection
  • Hide your IP
  • IMAP debugging
  • Malicious script blocker
  • Portable
  • Proactive Protection
  • Surf Anonymously
  • Tor
  • Tracker blocker
  • Traffic Analysis
Matrix.org

Matrix.org

FreeOpen SourceMacWindowsLinuxWebAndroidiPhoneAndroid TabletiPadSelf-HostedWebRTCPythonJavaScriptGo (Programming Language)JavaPerl

Matrix defines a set of open APIs for decentralised communication, suitable for securely publishing, persisting and subscribing to data over a global open federation of...

Features:

  • End-to-End Encryption
  • Chat
  • Decentralized
  • Random video chat
  • Voice chat
  • Chat Bot
  • Distributed
  • Encrypted chat
  • Group chat
  • Messaging
  • Real time collaboration
  • Server side history
  • Team Collaboration
  • Voice Call
  • WebRTC
I2P

I2P

FreeOpen SourceMacWindowsLinuxAndroidBSD

The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be...

Features:

  • Anonymous email
  • Anonymity
  • Alexa integration
  • Built-In Proxy
  • Decentralized
  • Decentralized email
  • Encryption
  • Internal torrent network
  • Torrent search
ProtonVPN

ProtonVPN

FreemiumOpen SourceMacWindowsLinuxAndroidiPhoneAndroid TabletiPadF-Droid

ProtonVPN is a highly secure and encrypted virtual private network (VPN).

Features:

  • Anonymity
  • Encrypted VPN
  • Privacy focused
  • Security focused
  • Anonymity
  • No Logs
  • Privacy Protected
  • Surf Anonymously
  • VPN
ProtonVPN

ProtonVPN

FreemiumOpen SourceMacWindowsLinuxAndroidiPhoneAndroid TabletiPadF-Droid

Security-focused VPN developed by CERN scientists from the ProtonMail team. Enabling Internet without surveillance.

Features:

  • Anonymity
  • Encrypted VPN
  • Privacy focused
  • Security focused
  • Anonymity
  • No Logs
  • Privacy Protected
  • Surf Anonymously
  • VPN
Shadowsocks

Shadowsocks

FreeOpen SourceMacWindowsLinuxAndroidiPhoneAndroid TabletiPad

A secure socks5 proxy, designed to protect your Internet traffic. - Super Fast Bleeding edge techniques using Asynchronous I/O and Event-driven programming. -...

Features:

  • Split Proxy
  • Tcp proxy
  • Anticensorship
  • Apps that Bypass Censorship
  • Bypass Firewall
  • Python
  • Surf Anonymously

Upvote Comparison

Interest Trends

i2pd (I2P Daemon) Reviews

Add your reviews & share your experience when using i2pd (I2P Daemon) to the world. Your opinion will be useful to others who are looking for the best i2pd (I2P Daemon) alternatives.

Copyright © 2021 TopAlter.com

Sites we Love: AnswerBun, MenuIva, UKBizDB, Sharing RPP