Knowledge (XXG)

Java Anon Proxy

Source đź“ť

294:, whose anonymization proxies are anonymous themselves, which means the users have to rely on unknown proxy operators. However, it means that all the relays used for JonDonym-mediated connections are known and identified, and therefore potentially targeted very easily by hackers, governmental agencies or lobbying groups. This has for example led to the issues mentioned below, where court orders essentially gave all control over the whole system to the German government. As discussed below, solutions like international distribution of the relays and the additional use of Tor can somewhat mitigate this loss of independence. 332:
changed source code on August 18, 2003, and subsequently criticized by many users. For the Dresden Mix, the feature continues to be part of their software until today. Tracing activities back in the past is still technically not possible for the operators, but anonymity now extends only to the time-point that a surveillance court order is issued. It was pointed out though that the new feature was covered by the AN.ON
2098: 1578: 97: 25: 2108: 1588: 314:
to JonDonym. JonDonym mix cascades are mostly operated by SMEs in multiple countries and mix cascades always include three mix servers for advanced security. As contractors of Jondos GmbH must ensure sufficient throughput of their mixes, anonymous web browsing at speeds 30-50 kbit/s is possible. Cost
339:
As a reaction to the threat from local authorities, the system has spread internationally. If the Mixes of a cascade are spread over several countries, the law enforcement agencies of all these countries would have to work together to reveal someone's identity. AN.ON publishes every year the number
323:
The online activities of the user can be revealed only if all Mixes of a Cascade work together by keeping log files and correlating their logs. However, all Mix operators have to sign a voluntary commitment not to keep such logs, and for any observer it is difficult to infiltrate all operators in a
331:
obtained a warrant to force the Dresden Mix operators to log access to a specific web address, which was hosting child pornography. AN.ON then decided to introduce a crime detection function in the server software in order to make this possible. The feature was made transparent by publishing the
306:
Use of JonDonym has been (and still is) free, but since financial backing of the original university research project ran out on 22 June 2007, a startup, Jondos GmbH, was founded by members of the original project team. Jondos GmbH has taken over development and continues to work on an improved
281:
The JonDonym client program allows the user to choose among several Mix Cascades (i.e. a group of anonymization proxies) offered by independent organisations. Users may choose by themselves whom of these operators they will trust, and whom they won't. This is different from
297:
The speed and availability of the service depends on the operators of the Mixes in the cascades, and therefore varies. More users on a cascade improve anonymity, but a large number of users might diminish the speed and bandwidth available for a single user.
1624: 467: 1617: 1610: 58: 676: 340:
of successful and unsuccessful surveillance court orders. Further research is being done by AN.ON to make the crime detection functionality more privacy-friendly.
2152: 315:
free Cascades are still in operation, although they do not offer the low latency, multiple Mixes per Cascade or guaranteed bandwidth the commercial ones do.
464: 328: 564: 1195: 820: 669: 396: 524: 951: 1370: 448: 44: 1633: 1425: 76: 240: 1591: 2142: 2137: 1581: 662: 307:
blocking resistance function that would make it easier for users from restrictive countries to get a connection to the system.
1902: 2112: 644: 2102: 1973: 1653: 916: 891: 376: 1497: 2132: 1541: 901: 252: 162: 133: 111: 54: 507: 270: 1708: 40: 35: 1777: 1295: 931: 244: 1531: 1435: 1405: 1100: 878: 777: 1751: 1526: 1395: 1265: 981: 351:
network. These features are still in an early stage and available only in the beta version of the software.
344: 287: 2147: 1693: 1553: 1546: 1385: 1160: 1797: 1703: 1558: 561: 592: 1924: 1698: 766: 484: 422: 1668: 1648: 1350: 838: 756: 746: 741: 685: 181: 262:
and mixes the data streams of multiple users in order to further obfuscate the data to outsiders.
1881: 1602: 1340: 1145: 1135: 366: 259: 248: 549: 528: 400: 1756: 1658: 1108: 989: 736: 721: 580: 603: 1080: 616: 371: 193: 169: 445: 311: 1792: 1400: 1260: 1189: 1155: 1140: 1052: 1019: 994: 568: 511: 471: 452: 186: 1896: 1683: 1090: 886: 310:
As a consequence, the JAP client has been renamed to JonDo and the service itself from
232: 174: 2126: 2065: 2037: 1983: 1958: 1860: 1818: 1536: 1335: 1009: 649: 361: 2081: 1782: 1746: 1736: 1728: 1673: 1275: 1067: 830: 693: 333: 283: 236: 228: 198: 650:
Guide On How To Set Up JAP easily and fast: "Surfing Anonymously within 7 Minutes"
441: 439: 1968: 1841: 1831: 1741: 1365: 1285: 1230: 1150: 581:
Project Declaration on the Future Relationship with Criminal Justice Authorities
24: 96: 2032: 2002: 1836: 1678: 1471: 1415: 1345: 1220: 1215: 1165: 1130: 1123: 1085: 1075: 1014: 800: 711: 701: 2058: 2053: 1891: 1865: 1854: 1312: 1302: 1290: 1280: 1245: 1210: 1205: 1118: 1024: 926: 858: 795: 706: 348: 639: 1886: 1787: 1487: 1461: 1390: 1250: 1240: 1225: 1170: 1047: 999: 966: 941: 921: 906: 751: 716: 654: 504: 265:
JonDonym is available for all platforms that support Java. Furthermore,
2012: 2007: 1992: 1908: 1847: 1826: 1510: 1505: 1456: 1270: 1004: 971: 961: 936: 896: 868: 848: 790: 731: 725: 1930: 1563: 1410: 1320: 956: 911: 863: 815: 255:
programming language. The service has been closed since August 2021.
1772: 1466: 1440: 1380: 1355: 1113: 1057: 1042: 946: 853: 810: 805: 785: 208: 1255: 1034: 1606: 658: 2095:
indicates that maintenance of the tool has been discontinued.
1997: 1325: 1235: 843: 343:
Since May 2006, JonDonym can also be used as a client for the
291: 18: 239:. It was originally developed as part of a project of the 50: 258:
Cross-platform and free, it sends requests through a
2074: 2046: 2025: 1982: 1951: 1944: 1917: 1874: 1817: 1810: 1765: 1726: 1719: 1641: 1519: 1496: 1480: 1449: 1424: 1364: 1311: 1188: 1099: 1066: 1033: 980: 877: 829: 776: 765: 692: 550:
Report on the Legal Proceedings against the Project
204: 192: 180: 168: 158: 132: 110: 39:, potentially preventing the article from being 525:"JonDonym abuse resistance and law enforcement" 1618: 670: 8: 89: 1948: 1814: 1723: 1625: 1611: 1603: 773: 677: 663: 655: 88: 59:reliable, independent, third-party sources 485:"ANONdroid - Android Apps on Google Play" 247:and Privacy Commissioner of the state of 139:0.20.002-beta / December 15, 2016 77:Learn how and when to remove this message 302:Cost, name change and commercial service 251:. The client-software is written in the 53:by replacing them with more appropriate 593:Tor: The Second-Generation Onion Router 388: 36:too closely associated with the subject 423:"JonDo changelog beta - JonDonym Wiki" 231:system designed to allow browsing the 1665:Censorship and blocking technologies 7: 2153:Java (programming language) software 2107: 1587: 347:network and since 2006 also for the 117:0.20.001 / December 15, 2016 336:and not a security leak by itself. 14: 1634:Internet censorship circumvention 397:"JonDo changelog - JonDonym Wiki" 209:Project: AN.ON - Anonymity.Online 2106: 2097: 2096: 1586: 1577: 1576: 562:AN.ON still guarantees anonymity 446:Privacy-friendly law enforcement 101:JonDo client software screenshot 95: 34:may rely excessively on sources 23: 269:is a JonDonym proxy client for 2026:Physical circumvention methods 606:, AN.ON Project, 02. July 2013 583:, AN.ON Project, 02. July 2013 286:based anonymity networks like 241:Technische Universität Dresden 1: 1690:Blocks on specific websites 1654:Internet censorship in China 1542:Cryptographic hash function 2169: 2090: 1778:IPv6 transition mechanism 1572: 327:In July 2003, the German 154: 106: 94: 1811:Anti-censorship software 1532:Timeline of cryptography 1684:Great Firewall of China 1527:Outline of cryptography 1498:Anti–computer forensics 645:AN.ON Project home page 617:"JonDo Help: Anonymity" 2143:Free security software 2138:Cryptographic software 2047:Relevant organizations 1766:Without a proxy server 1554:Homomorphic encryption 1547:List of hash functions 686:Cryptographic software 505:JonDonym press release 465:ANONdroid v. 00.00.008 245:Universität Regensburg 1798:Refraction networking 1559:End-to-end encryption 141:; 7 years ago 119:; 7 years ago 1875:Proprietary software 1674:DNS cache poisoning 1669:IP address blocking 1649:Internet censorship 91: 2133:Anonymity networks 1952:Anonymous software 1918:Browser extensions 1146:Facebook Messenger 640:JonDonym home page 567:2003-08-31 at the 510:2007-09-25 at the 470:2021-03-06 at the 451:2008-12-04 at the 367:Anonymous remailer 249:Schleswig-Holstein 2120: 2119: 2021: 2020: 1940: 1939: 1806: 1805: 1659:National intranet 1600: 1599: 1450:Service providers 1184: 1183: 990:Check Point VPN-1 214: 213: 87: 86: 79: 16:Anonymity network 2160: 2110: 2109: 2100: 2099: 1949: 1815: 1724: 1627: 1620: 1613: 1604: 1590: 1589: 1580: 1579: 1428:operating system 1426:Security-focused 1374: 1199: 774: 679: 672: 665: 656: 628: 627: 625: 623: 613: 607: 601: 595: 590: 584: 578: 572: 559: 553: 547: 541: 540: 538: 536: 531:on 14 March 2016 527:. Archived from 521: 515: 502: 496: 495: 493: 491: 481: 475: 462: 456: 443: 434: 433: 431: 429: 419: 413: 412: 410: 408: 399:. Archived from 393: 372:Internet privacy 223:) also known as 170:Operating system 149: 147: 142: 127: 125: 120: 99: 92: 82: 75: 71: 68: 62: 27: 19: 2168: 2167: 2163: 2162: 2161: 2159: 2158: 2157: 2123: 2122: 2121: 2116: 2086: 2070: 2042: 2017: 1978: 1936: 1913: 1870: 1802: 1793:Domain fronting 1761: 1715: 1709:Knowledge (XXG) 1637: 1631: 1601: 1596: 1568: 1515: 1492: 1476: 1445: 1427: 1420: 1368: 1360: 1331:Java Anon Proxy 1307: 1193: 1192: 1190:Disk encryption 1180: 1156:Google Messages 1141:Signal Protocol 1095: 1062: 1029: 976: 873: 825: 768: 761: 688: 683: 636: 631: 621: 619: 615: 614: 610: 604:Law enforcement 602: 598: 591: 587: 579: 575: 571:19. August 2003 569:Wayback Machine 560: 556: 552:, AN.ON Project 548: 544: 534: 532: 523: 522: 518: 512:Wayback Machine 503: 499: 489: 487: 483: 482: 478: 472:Wayback Machine 463: 459: 453:Wayback Machine 444: 437: 427: 425: 421: 420: 416: 406: 404: 395: 394: 390: 386: 381: 357: 321: 304: 279: 235:with revocable 217:Java Anon Proxy 187:Anonymous proxy 150: 145: 143: 140: 134:Preview release 128: 123: 121: 118: 102: 90:Java Anon Proxy 83: 72: 66: 63: 48: 28: 17: 12: 11: 5: 2166: 2164: 2156: 2155: 2150: 2145: 2140: 2135: 2125: 2124: 2118: 2117: 2091: 2088: 2087: 2085: 2084: 2078: 2076: 2072: 2071: 2069: 2068: 2063: 2062: 2061: 2050: 2048: 2044: 2043: 2041: 2040: 2035: 2029: 2027: 2023: 2022: 2019: 2018: 2016: 2015: 2010: 2005: 2000: 1995: 1989: 1987: 1980: 1979: 1977: 1976: 1971: 1966: 1964:JAP (JonDonym) 1961: 1955: 1953: 1946: 1942: 1941: 1938: 1937: 1935: 1934: 1927: 1921: 1919: 1915: 1914: 1912: 1911: 1906: 1899: 1897:Hotspot Shield 1894: 1889: 1884: 1878: 1876: 1872: 1871: 1869: 1868: 1863: 1858: 1851: 1844: 1839: 1834: 1829: 1823: 1821: 1812: 1808: 1807: 1804: 1803: 1801: 1800: 1795: 1790: 1785: 1780: 1775: 1769: 1767: 1763: 1762: 1760: 1759: 1754: 1749: 1744: 1739: 1733: 1731: 1721: 1717: 1716: 1714: 1713: 1712: 1711: 1706: 1701: 1696: 1688: 1687: 1686: 1681: 1676: 1671: 1663: 1662: 1661: 1656: 1645: 1643: 1639: 1638: 1632: 1630: 1629: 1622: 1615: 1607: 1598: 1597: 1595: 1594: 1584: 1573: 1570: 1569: 1567: 1566: 1561: 1556: 1551: 1550: 1549: 1544: 1537:Hash functions 1534: 1529: 1523: 1521: 1520:Related topics 1517: 1516: 1514: 1513: 1508: 1502: 1500: 1494: 1493: 1491: 1490: 1484: 1482: 1478: 1477: 1475: 1474: 1469: 1464: 1459: 1453: 1451: 1447: 1446: 1444: 1443: 1438: 1432: 1430: 1422: 1421: 1419: 1418: 1413: 1408: 1403: 1398: 1393: 1388: 1383: 1377: 1375: 1362: 1361: 1359: 1358: 1353: 1348: 1343: 1338: 1333: 1328: 1323: 1317: 1315: 1309: 1308: 1306: 1305: 1300: 1299: 1298: 1288: 1283: 1278: 1273: 1268: 1263: 1258: 1253: 1248: 1243: 1238: 1233: 1228: 1223: 1218: 1213: 1208: 1202: 1200: 1186: 1185: 1182: 1181: 1179: 1178: 1175: 1174: 1173: 1168: 1163: 1158: 1153: 1148: 1138: 1133: 1128: 1127: 1126: 1121: 1111: 1105: 1103: 1097: 1096: 1094: 1093: 1088: 1083: 1078: 1072: 1070: 1064: 1063: 1061: 1060: 1055: 1050: 1045: 1039: 1037: 1031: 1030: 1028: 1027: 1022: 1017: 1012: 1007: 1002: 997: 992: 986: 984: 978: 977: 975: 974: 969: 964: 959: 954: 949: 944: 939: 934: 929: 924: 919: 914: 909: 904: 899: 894: 889: 887:BBM Enterprise 883: 881: 875: 874: 872: 871: 866: 861: 856: 851: 846: 841: 835: 833: 827: 826: 824: 823: 818: 813: 808: 803: 798: 793: 788: 782: 780: 771: 763: 762: 760: 759: 754: 749: 744: 739: 734: 729: 719: 714: 709: 704: 698: 696: 690: 689: 684: 682: 681: 674: 667: 659: 653: 652: 647: 642: 635: 634:External links 632: 630: 629: 608: 596: 585: 573: 554: 542: 516: 497: 476: 457: 435: 414: 403:on 3 July 2011 387: 385: 382: 380: 379: 374: 369: 364: 358: 356: 353: 324:long cascade. 320: 317: 303: 300: 278: 275: 212: 211: 206: 202: 201: 196: 190: 189: 184: 178: 177: 175:Cross-platform 172: 166: 165: 160: 156: 155: 152: 151: 138: 136: 130: 129: 116: 114: 112:Stable release 108: 107: 104: 103: 100: 85: 84: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 2165: 2154: 2151: 2149: 2148:Proxy servers 2146: 2144: 2141: 2139: 2136: 2134: 2131: 2130: 2128: 2115: 2114: 2105: 2104: 2094: 2089: 2083: 2080: 2079: 2077: 2073: 2067: 2066:Turkey Blocks 2064: 2060: 2057: 2056: 2055: 2052: 2051: 2049: 2045: 2039: 2038:USB dead drop 2036: 2034: 2031: 2030: 2028: 2024: 2014: 2011: 2009: 2006: 2004: 2001: 1999: 1996: 1994: 1991: 1990: 1988: 1985: 1984:Anonymous P2P 1981: 1975: 1972: 1970: 1967: 1965: 1962: 1960: 1957: 1956: 1954: 1950: 1947: 1943: 1933: 1932: 1928: 1926: 1923: 1922: 1920: 1916: 1910: 1907: 1905: 1904: 1900: 1898: 1895: 1893: 1890: 1888: 1885: 1883: 1880: 1879: 1877: 1873: 1867: 1864: 1862: 1859: 1857: 1856: 1852: 1850: 1849: 1845: 1843: 1840: 1838: 1835: 1833: 1830: 1828: 1825: 1824: 1822: 1820: 1819:Free software 1816: 1813: 1809: 1799: 1796: 1794: 1791: 1789: 1786: 1784: 1781: 1779: 1776: 1774: 1771: 1770: 1768: 1764: 1758: 1755: 1753: 1750: 1748: 1745: 1743: 1740: 1738: 1735: 1734: 1732: 1730: 1725: 1722: 1718: 1710: 1707: 1705: 1702: 1700: 1697: 1695: 1692: 1691: 1689: 1685: 1682: 1680: 1677: 1675: 1672: 1670: 1667: 1666: 1664: 1660: 1657: 1655: 1652: 1651: 1650: 1647: 1646: 1644: 1640: 1635: 1628: 1623: 1621: 1616: 1614: 1609: 1608: 1605: 1593: 1585: 1583: 1575: 1574: 1571: 1565: 1562: 1560: 1557: 1555: 1552: 1548: 1545: 1543: 1540: 1539: 1538: 1535: 1533: 1530: 1528: 1525: 1524: 1522: 1518: 1512: 1509: 1507: 1504: 1503: 1501: 1499: 1495: 1489: 1486: 1485: 1483: 1479: 1473: 1470: 1468: 1465: 1463: 1460: 1458: 1455: 1454: 1452: 1448: 1442: 1439: 1437: 1434: 1433: 1431: 1429: 1423: 1417: 1414: 1412: 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1382: 1379: 1378: 1376: 1372: 1367: 1363: 1357: 1354: 1352: 1349: 1347: 1344: 1342: 1339: 1337: 1334: 1332: 1329: 1327: 1324: 1322: 1319: 1318: 1316: 1314: 1310: 1304: 1301: 1297: 1294: 1293: 1292: 1289: 1287: 1284: 1282: 1279: 1277: 1274: 1272: 1269: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1242: 1239: 1237: 1234: 1232: 1229: 1227: 1224: 1222: 1219: 1217: 1214: 1212: 1209: 1207: 1204: 1203: 1201: 1197: 1191: 1187: 1176: 1172: 1169: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1143: 1142: 1139: 1137: 1134: 1132: 1129: 1125: 1122: 1120: 1117: 1116: 1115: 1112: 1110: 1107: 1106: 1104: 1102: 1098: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1073: 1071: 1069: 1065: 1059: 1056: 1054: 1051: 1049: 1046: 1044: 1041: 1040: 1038: 1036: 1032: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1010:SoftEther VPN 1008: 1006: 1003: 1001: 998: 996: 993: 991: 988: 987: 985: 983: 979: 973: 970: 968: 965: 963: 960: 958: 955: 953: 950: 948: 945: 943: 940: 938: 935: 933: 930: 928: 925: 923: 920: 918: 915: 913: 910: 908: 905: 903: 900: 898: 895: 893: 892:Bouncy Castle 890: 888: 885: 884: 882: 880: 879:TLS & SSL 876: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 836: 834: 832: 828: 822: 819: 817: 814: 812: 809: 807: 804: 802: 799: 797: 794: 792: 789: 787: 784: 783: 781: 779: 775: 772: 770: 769:communication 764: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 727: 723: 720: 718: 715: 713: 710: 708: 705: 703: 700: 699: 697: 695: 694:Email clients 691: 687: 680: 675: 673: 668: 666: 661: 660: 657: 651: 648: 646: 643: 641: 638: 637: 633: 618: 612: 609: 605: 600: 597: 594: 589: 586: 582: 577: 574: 570: 566: 563: 558: 555: 551: 546: 543: 530: 526: 520: 517: 513: 509: 506: 501: 498: 486: 480: 477: 473: 469: 466: 461: 458: 454: 450: 447: 442: 440: 436: 424: 418: 415: 402: 398: 392: 389: 383: 378: 375: 373: 370: 368: 365: 363: 362:Anonymous P2P 360: 359: 354: 352: 350: 346: 341: 337: 335: 330: 325: 318: 316: 313: 308: 301: 299: 295: 293: 289: 285: 276: 274: 272: 268: 263: 261: 256: 254: 250: 246: 242: 238: 234: 230: 226: 222: 218: 210: 207: 203: 200: 197: 195: 191: 188: 185: 183: 179: 176: 173: 171: 167: 164: 161: 157: 153: 137: 135: 131: 115: 113: 109: 105: 98: 93: 81: 78: 70: 67:December 2017 60: 56: 52: 46: 42: 38: 37: 32:This article 30: 26: 21: 20: 2111: 2101: 2092: 2082:Great Cannon 1963: 1929: 1901: 1853: 1846: 1729:proxy server 1636:technologies 1366:File systems 1330: 1276:Private Disk 620:. Retrieved 611: 599: 588: 576: 557: 545: 533:. Retrieved 529:the original 519: 500: 488:. Retrieved 479: 460: 426:. Retrieved 417: 405:. Retrieved 401:the original 391: 342: 338: 334:threat model 326: 322: 309: 305: 296: 284:peer-to-peer 280: 266: 264: 257: 237:pseudonymity 224: 220: 216: 215: 199:BSD licenses 73: 64: 49:Please help 33: 1969:Flash proxy 1842:Outline VPN 1832:Shadowsocks 1742:Web proxies 1481:Educational 1286:Sentry 2020 1231:DriveSentry 1151:Google Allo 757:Thunderbird 260:Mix Cascade 2127:Categories 2033:Sneakernet 2003:StealthNet 1837:OnionShare 1720:Principles 1679:Wordfilter 1642:Background 1472:NordLocker 1416:Tahoe-LAFS 1406:Rubberhose 1346:RetroShare 1221:Cryptoloop 1216:CrossCrypt 1196:Comparison 1166:TextSecure 1124:ChatSecure 1086:RetroShare 1076:Bitmessage 1015:strongSwan 801:ChatSecure 712:Claws Mail 702:Apple Mail 474:2011-12-22 384:References 159:Written in 146:2016-12-15 124:2016-12-15 51:improve it 41:verifiable 2075:Reference 2059:FreeWeibo 2054:GreatFire 1974:Mixmaster 1945:Anonymity 1925:Snowflake 1892:Ultrasurf 1866:WireGuard 1855:PirateBox 1313:Anonymity 1303:VeraCrypt 1291:TrueCrypt 1281:Scramdisk 1246:FileVault 1211:BitLocker 1206:BestCrypt 1119:Cryptocat 1025:WireGuard 927:MatrixSSL 897:BoringSSL 859:SecureCRT 821:Profanity 796:Centericq 707:Autocrypt 622:7 January 535:7 January 490:7 January 428:7 January 407:7 January 377:Mixmaster 349:Mixminion 267:ANONdroid 55:citations 2103:Category 1887:Freegate 1861:VPN Gate 1788:DNSCrypt 1694:Facebook 1582:Category 1488:CrypTool 1462:Tresorit 1391:eCryptfs 1351:Ricochet 1251:FreeOTFE 1241:eCryptfs 1226:dm-crypt 1171:WhatsApp 1048:Linphone 1000:Openswan 967:TeamNote 952:SChannel 942:mbed TLS 922:LibreSSL 907:cryptlib 839:Dropbear 752:Sylpheed 717:Enigmail 565:Archived 508:Archived 468:Archived 449:Archived 355:See also 227:, was a 225:JonDonym 2113:Commons 2093:Italics 2013:ZeroNet 2008:Tribler 1993:Freenet 1986:network 1909:Proxify 1882:Lantern 1848:GoAgent 1827:Psiphon 1727:With a 1704:Twitter 1592:Commons 1511:BusKill 1506:USBKill 1457:Freenet 1341:Vidalia 1296:History 1271:PGPDisk 1177:SimpleX 1136:Session 1131:Proteus 1005:OpenVPN 995:Hamachi 972:wolfSSL 962:stunnel 937:OpenSSL 869:wolfSSH 849:OpenSSH 791:BitlBee 737:Outlook 732:Kontact 726:Gpg4win 319:Privacy 271:Android 205:Website 194:License 144: ( 122: ( 45:neutral 1931:uProxy 1699:GitHub 1564:S/MIME 1411:StegFS 1321:GNUnet 1161:Signal 1109:Matrix 957:SSLeay 912:GnuTLS 864:WinSCP 816:Kopete 767:Secure 277:Design 243:, the 1903:Telex 1783:hosts 1773:HTTPS 1467:Wuala 1441:Qubes 1436:Tails 1381:EncFS 1356:Wickr 1114:OMEMO 1081:Briar 1058:Zfone 1043:Jitsi 947:BSAFE 902:Botan 854:PuTTY 811:Jitsi 806:climm 786:Adium 312:AN.ON 229:proxy 1401:PEFS 1396:LUKS 1371:List 1266:LUKS 1261:geli 1256:GBDE 1053:Jami 1035:ZRTP 1020:Tinc 917:JSSE 624:2017 537:2017 514:2007 492:2017 455:2006 430:2017 409:2017 290:and 253:Java 182:Type 163:Java 43:and 1998:I2P 1959:Tor 1757:PAC 1752:VPN 1747:SSH 1737:P2P 1386:EFS 1336:Tor 1326:I2P 1236:E4M 1101:DRA 1091:Tox 1068:P2P 982:VPN 932:NSS 844:lsh 831:SSH 778:OTR 747:PGP 742:p≡p 722:GPG 345:Tor 329:BKA 292:I2P 288:Tor 233:Web 221:JAP 57:to 2129:: 438:^ 273:. 1626:e 1619:t 1612:v 1373:) 1369:( 1198:) 1194:( 728:) 724:( 678:e 671:t 664:v 626:. 539:. 494:. 432:. 411:. 219:( 148:) 126:) 80:) 74:( 69:) 65:( 61:. 47:.

Index


too closely associated with the subject
verifiable
neutral
improve it
citations
reliable, independent, third-party sources
Learn how and when to remove this message

Stable release
Preview release
Java
Operating system
Cross-platform
Type
Anonymous proxy
License
BSD licenses
Project: AN.ON - Anonymity.Online
proxy
Web
pseudonymity
Technische Universität Dresden
Universität Regensburg
Schleswig-Holstein
Java
Mix Cascade
Android
peer-to-peer
Tor

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑