When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Hyphanet - Wikipedia

    en.wikipedia.org/wiki/Hyphanet

    Hyphanet (until mid-2023: Freenet [5]) is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.

  3. I2P - Wikipedia

    en.wikipedia.org/wiki/I2P

    I2P is an anonymous peer-to-peer distributed communication layer designed to run any traditional internet service (e.g. Usenet, email, IRC, file sharing, Web hosting and HTTP, or Telnet), as well as more traditional distributed applications (e.g. a distributed data store, a web proxy network using Squid, or DNS).

  4. Ultrasurf - Wikipedia

    en.wikipedia.org/wiki/Ultrasurf

    UltraSurf is a closed-source freeware Internet censorship circumvention product [2] created by UltraReach Internet Corporation. The software bypasses Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy.

  5. Amnezia VPN - Wikipedia

    en.wikipedia.org/wiki/Amnezia_VPN

    Amnezia VPN does not require users to register, allowing all features to be accessed anonymously. It does not keep any logs of user activity and does not track users or use their personal data for any purposes.

  6. Stunnel - Wikipedia

    en.wikipedia.org/wiki/Stunnel

    It runs on a variety of operating systems, [5] including most Unix-like operating systems and Windows. Stunnel relies on the OpenSSL library to implement the underlying TLS or SSL protocol. Stunnel uses public-key cryptography with X.509 digital certificates to secure the SSL connection, and clients can optionally be authenticated via a ...

  7. Privoxy - Wikipedia

    en.wikipedia.org/wiki/Privoxy

    Privoxy is a "privacy enhancing proxy", filtering web pages and removing advertisements. Privoxy can be customized by users, for both stand-alone systems and multi-user networks. [ 2 ] Privoxy can be chained to other proxies and is frequently used in combination with Squid among others and can be used to bypass Internet censorship .

  8. Tails (operating system) - Wikipedia

    en.wikipedia.org/wiki/Tails_(operating_system)

    Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. [5] It connects to the Internet exclusively through the anonymity network Tor. [6]

  9. ZAP (software) - Wikipedia

    en.wikipedia.org/wiki/ZAP_(software)

    ZAP (Zed Attack Proxy) is a dynamic application security testing tool published under the Apache License. When used as a proxy server it allows the user to manipulate all of the traffic that passes through it, including HTTPS encrypted traffic. It can also run in a daemon mode which is then controlled via a REST-based API.