294:, whose anonymization proxies are anonymous themselves, which means the users have to rely on unknown proxy operators. However, it means that all the relays used for JonDonym-mediated connections are known and identified, and therefore potentially targeted very easily by hackers, governmental agencies or lobbying groups. This has for example led to the issues mentioned below, where court orders essentially gave all control over the whole system to the German government. As discussed below, solutions like international distribution of the relays and the additional use of Tor can somewhat mitigate this loss of independence.
332:
changed source code on August 18, 2003, and subsequently criticized by many users. For the
Dresden Mix, the feature continues to be part of their software until today. Tracing activities back in the past is still technically not possible for the operators, but anonymity now extends only to the time-point that a surveillance court order is issued. It was pointed out though that the new feature was covered by the AN.ON
2098:
1578:
97:
25:
2108:
1588:
314:
to JonDonym. JonDonym mix cascades are mostly operated by SMEs in multiple countries and mix cascades always include three mix servers for advanced security. As contractors of Jondos GmbH must ensure sufficient throughput of their mixes, anonymous web browsing at speeds 30-50 kbit/s is possible. Cost
339:
As a reaction to the threat from local authorities, the system has spread internationally. If the Mixes of a cascade are spread over several countries, the law enforcement agencies of all these countries would have to work together to reveal someone's identity. AN.ON publishes every year the number
323:
The online activities of the user can be revealed only if all Mixes of a
Cascade work together by keeping log files and correlating their logs. However, all Mix operators have to sign a voluntary commitment not to keep such logs, and for any observer it is difficult to infiltrate all operators in a
331:
obtained a warrant to force the
Dresden Mix operators to log access to a specific web address, which was hosting child pornography. AN.ON then decided to introduce a crime detection function in the server software in order to make this possible. The feature was made transparent by publishing the
306:
Use of JonDonym has been (and still is) free, but since financial backing of the original university research project ran out on 22 June 2007, a startup, Jondos GmbH, was founded by members of the original project team. Jondos GmbH has taken over development and continues to work on an improved
281:
The JonDonym client program allows the user to choose among several Mix
Cascades (i.e. a group of anonymization proxies) offered by independent organisations. Users may choose by themselves whom of these operators they will trust, and whom they won't. This is different from
297:
The speed and availability of the service depends on the operators of the Mixes in the cascades, and therefore varies. More users on a cascade improve anonymity, but a large number of users might diminish the speed and bandwidth available for a single user.
1624:
467:
1617:
1610:
58:
676:
340:
of successful and unsuccessful surveillance court orders. Further research is being done by AN.ON to make the crime detection functionality more privacy-friendly.
2152:
315:
free
Cascades are still in operation, although they do not offer the low latency, multiple Mixes per Cascade or guaranteed bandwidth the commercial ones do.
464:
328:
564:
1195:
820:
669:
396:
524:
951:
1370:
448:
44:
1633:
1425:
76:
240:
1591:
2142:
2137:
1581:
662:
307:
blocking resistance function that would make it easier for users from restrictive countries to get a connection to the system.
1902:
2112:
644:
2102:
1973:
1653:
916:
891:
376:
1497:
2132:
1541:
901:
252:
162:
133:
111:
54:
507:
270:
1708:
40:
35:
1777:
1295:
931:
244:
1531:
1435:
1405:
1100:
878:
777:
1751:
1526:
1395:
1265:
981:
351:
network. These features are still in an early stage and available only in the beta version of the software.
344:
287:
2147:
1693:
1553:
1546:
1385:
1160:
1797:
1703:
1558:
561:
592:
1924:
1698:
766:
484:
422:
1668:
1648:
1350:
838:
756:
746:
741:
685:
181:
262:
and mixes the data streams of multiple users in order to further obfuscate the data to outsiders.
1881:
1602:
1340:
1145:
1135:
366:
259:
248:
549:
528:
400:
1756:
1658:
1108:
989:
736:
721:
580:
603:
1080:
616:
371:
193:
169:
445:
311:
1792:
1400:
1260:
1189:
1155:
1140:
1052:
1019:
994:
568:
511:
471:
452:
186:
1896:
1683:
1090:
886:
310:
As a consequence, the JAP client has been renamed to JonDo and the service itself from
232:
174:
2126:
2065:
2037:
1983:
1958:
1860:
1818:
1536:
1335:
1009:
649:
361:
2081:
1782:
1746:
1736:
1728:
1673:
1275:
1067:
830:
693:
333:
283:
236:
228:
198:
650:
Guide On How To Set Up JAP easily and fast: "Surfing
Anonymously within 7 Minutes"
441:
439:
1968:
1841:
1831:
1741:
1365:
1285:
1230:
1150:
581:
Project
Declaration on the Future Relationship with Criminal Justice Authorities
24:
96:
2032:
2002:
1836:
1678:
1471:
1415:
1345:
1220:
1215:
1165:
1130:
1123:
1085:
1075:
1014:
800:
711:
701:
2058:
2053:
1891:
1865:
1854:
1312:
1302:
1290:
1280:
1245:
1210:
1205:
1118:
1024:
926:
858:
795:
706:
348:
639:
1886:
1787:
1487:
1461:
1390:
1250:
1240:
1225:
1170:
1047:
999:
966:
941:
921:
906:
751:
716:
654:
504:
265:
JonDonym is available for all platforms that support Java. Furthermore,
2012:
2007:
1992:
1908:
1847:
1826:
1510:
1505:
1456:
1270:
1004:
971:
961:
936:
896:
868:
848:
790:
731:
725:
1930:
1563:
1410:
1320:
956:
911:
863:
815:
255:
programming language. The service has been closed since August 2021.
1772:
1466:
1440:
1380:
1355:
1113:
1057:
1042:
946:
853:
810:
805:
785:
208:
1255:
1034:
1606:
658:
2095:
indicates that maintenance of the tool has been discontinued.
1997:
1325:
1235:
843:
343:
Since May 2006, JonDonym can also be used as a client for the
291:
18:
239:. It was originally developed as part of a project of the
50:
258:
Cross-platform and free, it sends requests through a
2074:
2046:
2025:
1982:
1951:
1944:
1917:
1874:
1817:
1810:
1765:
1726:
1719:
1641:
1519:
1496:
1480:
1449:
1424:
1364:
1311:
1188:
1099:
1066:
1033:
980:
877:
829:
776:
765:
692:
550:
204:
192:
180:
168:
158:
132:
110:
39:, potentially preventing the article from being
525:"JonDonym abuse resistance and law enforcement"
1618:
670:
8:
89:
1948:
1814:
1723:
1625:
1611:
1603:
773:
677:
663:
655:
88:
59:reliable, independent, third-party sources
485:"ANONdroid - Android Apps on Google Play"
247:and Privacy Commissioner of the state of
139:0.20.002-beta / December 15, 2016
77:Learn how and when to remove this message
302:Cost, name change and commercial service
251:. The client-software is written in the
53:by replacing them with more appropriate
593:Tor: The Second-Generation Onion Router
388:
36:too closely associated with the subject
423:"JonDo changelog beta - JonDonym Wiki"
231:system designed to allow browsing the
1665:Censorship and blocking technologies
7:
2153:Java (programming language) software
2107:
1587:
347:network and since 2006 also for the
117:0.20.001 / December 15, 2016
336:and not a security leak by itself.
14:
1634:Internet censorship circumvention
397:"JonDo changelog - JonDonym Wiki"
209:Project: AN.ON - Anonymity.Online
2106:
2097:
2096:
1586:
1577:
1576:
562:AN.ON still guarantees anonymity
446:Privacy-friendly law enforcement
101:JonDo client software screenshot
95:
34:may rely excessively on sources
23:
269:is a JonDonym proxy client for
2026:Physical circumvention methods
606:, AN.ON Project, 02. July 2013
583:, AN.ON Project, 02. July 2013
286:based anonymity networks like
241:Technische Universität Dresden
1:
1690:Blocks on specific websites
1654:Internet censorship in China
1542:Cryptographic hash function
2169:
2090:
1778:IPv6 transition mechanism
1572:
327:In July 2003, the German
154:
106:
94:
1811:Anti-censorship software
1532:Timeline of cryptography
1684:Great Firewall of China
1527:Outline of cryptography
1498:Anti–computer forensics
645:AN.ON Project home page
617:"JonDo Help: Anonymity"
2143:Free security software
2138:Cryptographic software
2047:Relevant organizations
1766:Without a proxy server
1554:Homomorphic encryption
1547:List of hash functions
686:Cryptographic software
505:JonDonym press release
465:ANONdroid v. 00.00.008
245:Universität Regensburg
1798:Refraction networking
1559:End-to-end encryption
141:; 7 years ago
119:; 7 years ago
1875:Proprietary software
1674:DNS cache poisoning
1669:IP address blocking
1649:Internet censorship
91:
2133:Anonymity networks
1952:Anonymous software
1918:Browser extensions
1146:Facebook Messenger
640:JonDonym home page
567:2003-08-31 at the
510:2007-09-25 at the
470:2021-03-06 at the
451:2008-12-04 at the
367:Anonymous remailer
249:Schleswig-Holstein
2120:
2119:
2021:
2020:
1940:
1939:
1806:
1805:
1659:National intranet
1600:
1599:
1450:Service providers
1184:
1183:
990:Check Point VPN-1
214:
213:
87:
86:
79:
16:Anonymity network
2160:
2110:
2109:
2100:
2099:
1949:
1815:
1724:
1627:
1620:
1613:
1604:
1590:
1589:
1580:
1579:
1428:operating system
1426:Security-focused
1374:
1199:
774:
679:
672:
665:
656:
628:
627:
625:
623:
613:
607:
601:
595:
590:
584:
578:
572:
559:
553:
547:
541:
540:
538:
536:
531:on 14 March 2016
527:. Archived from
521:
515:
502:
496:
495:
493:
491:
481:
475:
462:
456:
443:
434:
433:
431:
429:
419:
413:
412:
410:
408:
399:. Archived from
393:
372:Internet privacy
223:) also known as
170:Operating system
149:
147:
142:
127:
125:
120:
99:
92:
82:
75:
71:
68:
62:
27:
19:
2168:
2167:
2163:
2162:
2161:
2159:
2158:
2157:
2123:
2122:
2121:
2116:
2086:
2070:
2042:
2017:
1978:
1936:
1913:
1870:
1802:
1793:Domain fronting
1761:
1715:
1709:Knowledge (XXG)
1637:
1631:
1601:
1596:
1568:
1515:
1492:
1476:
1445:
1427:
1420:
1368:
1360:
1331:Java Anon Proxy
1307:
1193:
1192:
1190:Disk encryption
1180:
1156:Google Messages
1141:Signal Protocol
1095:
1062:
1029:
976:
873:
825:
768:
761:
688:
683:
636:
631:
621:
619:
615:
614:
610:
604:Law enforcement
602:
598:
591:
587:
579:
575:
571:19. August 2003
569:Wayback Machine
560:
556:
552:, AN.ON Project
548:
544:
534:
532:
523:
522:
518:
512:Wayback Machine
503:
499:
489:
487:
483:
482:
478:
472:Wayback Machine
463:
459:
453:Wayback Machine
444:
437:
427:
425:
421:
420:
416:
406:
404:
395:
394:
390:
386:
381:
357:
321:
304:
279:
235:with revocable
217:Java Anon Proxy
187:Anonymous proxy
150:
145:
143:
140:
134:Preview release
128:
123:
121:
118:
102:
90:Java Anon Proxy
83:
72:
66:
63:
48:
28:
17:
12:
11:
5:
2166:
2164:
2156:
2155:
2150:
2145:
2140:
2135:
2125:
2124:
2118:
2117:
2091:
2088:
2087:
2085:
2084:
2078:
2076:
2072:
2071:
2069:
2068:
2063:
2062:
2061:
2050:
2048:
2044:
2043:
2041:
2040:
2035:
2029:
2027:
2023:
2022:
2019:
2018:
2016:
2015:
2010:
2005:
2000:
1995:
1989:
1987:
1980:
1979:
1977:
1976:
1971:
1966:
1964:JAP (JonDonym)
1961:
1955:
1953:
1946:
1942:
1941:
1938:
1937:
1935:
1934:
1927:
1921:
1919:
1915:
1914:
1912:
1911:
1906:
1899:
1897:Hotspot Shield
1894:
1889:
1884:
1878:
1876:
1872:
1871:
1869:
1868:
1863:
1858:
1851:
1844:
1839:
1834:
1829:
1823:
1821:
1812:
1808:
1807:
1804:
1803:
1801:
1800:
1795:
1790:
1785:
1780:
1775:
1769:
1767:
1763:
1762:
1760:
1759:
1754:
1749:
1744:
1739:
1733:
1731:
1721:
1717:
1716:
1714:
1713:
1712:
1711:
1706:
1701:
1696:
1688:
1687:
1686:
1681:
1676:
1671:
1663:
1662:
1661:
1656:
1645:
1643:
1639:
1638:
1632:
1630:
1629:
1622:
1615:
1607:
1598:
1597:
1595:
1594:
1584:
1573:
1570:
1569:
1567:
1566:
1561:
1556:
1551:
1550:
1549:
1544:
1537:Hash functions
1534:
1529:
1523:
1521:
1520:Related topics
1517:
1516:
1514:
1513:
1508:
1502:
1500:
1494:
1493:
1491:
1490:
1484:
1482:
1478:
1477:
1475:
1474:
1469:
1464:
1459:
1453:
1451:
1447:
1446:
1444:
1443:
1438:
1432:
1430:
1422:
1421:
1419:
1418:
1413:
1408:
1403:
1398:
1393:
1388:
1383:
1377:
1375:
1362:
1361:
1359:
1358:
1353:
1348:
1343:
1338:
1333:
1328:
1323:
1317:
1315:
1309:
1308:
1306:
1305:
1300:
1299:
1298:
1288:
1283:
1278:
1273:
1268:
1263:
1258:
1253:
1248:
1243:
1238:
1233:
1228:
1223:
1218:
1213:
1208:
1202:
1200:
1186:
1185:
1182:
1181:
1179:
1178:
1175:
1174:
1173:
1168:
1163:
1158:
1153:
1148:
1138:
1133:
1128:
1127:
1126:
1121:
1111:
1105:
1103:
1097:
1096:
1094:
1093:
1088:
1083:
1078:
1072:
1070:
1064:
1063:
1061:
1060:
1055:
1050:
1045:
1039:
1037:
1031:
1030:
1028:
1027:
1022:
1017:
1012:
1007:
1002:
997:
992:
986:
984:
978:
977:
975:
974:
969:
964:
959:
954:
949:
944:
939:
934:
929:
924:
919:
914:
909:
904:
899:
894:
889:
887:BBM Enterprise
883:
881:
875:
874:
872:
871:
866:
861:
856:
851:
846:
841:
835:
833:
827:
826:
824:
823:
818:
813:
808:
803:
798:
793:
788:
782:
780:
771:
763:
762:
760:
759:
754:
749:
744:
739:
734:
729:
719:
714:
709:
704:
698:
696:
690:
689:
684:
682:
681:
674:
667:
659:
653:
652:
647:
642:
635:
634:External links
632:
630:
629:
608:
596:
585:
573:
554:
542:
516:
497:
476:
457:
435:
414:
403:on 3 July 2011
387:
385:
382:
380:
379:
374:
369:
364:
358:
356:
353:
324:long cascade.
320:
317:
303:
300:
278:
275:
212:
211:
206:
202:
201:
196:
190:
189:
184:
178:
177:
175:Cross-platform
172:
166:
165:
160:
156:
155:
152:
151:
138:
136:
130:
129:
116:
114:
112:Stable release
108:
107:
104:
103:
100:
85:
84:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
2165:
2154:
2151:
2149:
2148:Proxy servers
2146:
2144:
2141:
2139:
2136:
2134:
2131:
2130:
2128:
2115:
2114:
2105:
2104:
2094:
2089:
2083:
2080:
2079:
2077:
2073:
2067:
2066:Turkey Blocks
2064:
2060:
2057:
2056:
2055:
2052:
2051:
2049:
2045:
2039:
2038:USB dead drop
2036:
2034:
2031:
2030:
2028:
2024:
2014:
2011:
2009:
2006:
2004:
2001:
1999:
1996:
1994:
1991:
1990:
1988:
1985:
1984:Anonymous P2P
1981:
1975:
1972:
1970:
1967:
1965:
1962:
1960:
1957:
1956:
1954:
1950:
1947:
1943:
1933:
1932:
1928:
1926:
1923:
1922:
1920:
1916:
1910:
1907:
1905:
1904:
1900:
1898:
1895:
1893:
1890:
1888:
1885:
1883:
1880:
1879:
1877:
1873:
1867:
1864:
1862:
1859:
1857:
1856:
1852:
1850:
1849:
1845:
1843:
1840:
1838:
1835:
1833:
1830:
1828:
1825:
1824:
1822:
1820:
1819:Free software
1816:
1813:
1809:
1799:
1796:
1794:
1791:
1789:
1786:
1784:
1781:
1779:
1776:
1774:
1771:
1770:
1768:
1764:
1758:
1755:
1753:
1750:
1748:
1745:
1743:
1740:
1738:
1735:
1734:
1732:
1730:
1725:
1722:
1718:
1710:
1707:
1705:
1702:
1700:
1697:
1695:
1692:
1691:
1689:
1685:
1682:
1680:
1677:
1675:
1672:
1670:
1667:
1666:
1664:
1660:
1657:
1655:
1652:
1651:
1650:
1647:
1646:
1644:
1640:
1635:
1628:
1623:
1621:
1616:
1614:
1609:
1608:
1605:
1593:
1585:
1583:
1575:
1574:
1571:
1565:
1562:
1560:
1557:
1555:
1552:
1548:
1545:
1543:
1540:
1539:
1538:
1535:
1533:
1530:
1528:
1525:
1524:
1522:
1518:
1512:
1509:
1507:
1504:
1503:
1501:
1499:
1495:
1489:
1486:
1485:
1483:
1479:
1473:
1470:
1468:
1465:
1463:
1460:
1458:
1455:
1454:
1452:
1448:
1442:
1439:
1437:
1434:
1433:
1431:
1429:
1423:
1417:
1414:
1412:
1409:
1407:
1404:
1402:
1399:
1397:
1394:
1392:
1389:
1387:
1384:
1382:
1379:
1378:
1376:
1372:
1367:
1363:
1357:
1354:
1352:
1349:
1347:
1344:
1342:
1339:
1337:
1334:
1332:
1329:
1327:
1324:
1322:
1319:
1318:
1316:
1314:
1310:
1304:
1301:
1297:
1294:
1293:
1292:
1289:
1287:
1284:
1282:
1279:
1277:
1274:
1272:
1269:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1242:
1239:
1237:
1234:
1232:
1229:
1227:
1224:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1203:
1201:
1197:
1191:
1187:
1176:
1172:
1169:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1143:
1142:
1139:
1137:
1134:
1132:
1129:
1125:
1122:
1120:
1117:
1116:
1115:
1112:
1110:
1107:
1106:
1104:
1102:
1098:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1073:
1071:
1069:
1065:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1040:
1038:
1036:
1032:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1010:SoftEther VPN
1008:
1006:
1003:
1001:
998:
996:
993:
991:
988:
987:
985:
983:
979:
973:
970:
968:
965:
963:
960:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
928:
925:
923:
920:
918:
915:
913:
910:
908:
905:
903:
900:
898:
895:
893:
892:Bouncy Castle
890:
888:
885:
884:
882:
880:
879:TLS & SSL
876:
870:
867:
865:
862:
860:
857:
855:
852:
850:
847:
845:
842:
840:
837:
836:
834:
832:
828:
822:
819:
817:
814:
812:
809:
807:
804:
802:
799:
797:
794:
792:
789:
787:
784:
783:
781:
779:
775:
772:
770:
769:communication
764:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
727:
723:
720:
718:
715:
713:
710:
708:
705:
703:
700:
699:
697:
695:
694:Email clients
691:
687:
680:
675:
673:
668:
666:
661:
660:
657:
651:
648:
646:
643:
641:
638:
637:
633:
618:
612:
609:
605:
600:
597:
594:
589:
586:
582:
577:
574:
570:
566:
563:
558:
555:
551:
546:
543:
530:
526:
520:
517:
513:
509:
506:
501:
498:
486:
480:
477:
473:
469:
466:
461:
458:
454:
450:
447:
442:
440:
436:
424:
418:
415:
402:
398:
392:
389:
383:
378:
375:
373:
370:
368:
365:
363:
362:Anonymous P2P
360:
359:
354:
352:
350:
346:
341:
337:
335:
330:
325:
318:
316:
313:
308:
301:
299:
295:
293:
289:
285:
276:
274:
272:
268:
263:
261:
256:
254:
250:
246:
242:
238:
234:
230:
226:
222:
218:
210:
207:
203:
200:
197:
195:
191:
188:
185:
183:
179:
176:
173:
171:
167:
164:
161:
157:
153:
137:
135:
131:
115:
113:
109:
105:
98:
93:
81:
78:
70:
67:December 2017
60:
56:
52:
46:
42:
38:
37:
32:This article
30:
26:
21:
20:
2111:
2101:
2092:
2082:Great Cannon
1963:
1929:
1901:
1853:
1846:
1729:proxy server
1636:technologies
1366:File systems
1330:
1276:Private Disk
620:. Retrieved
611:
599:
588:
576:
557:
545:
533:. Retrieved
529:the original
519:
500:
488:. Retrieved
479:
460:
426:. Retrieved
417:
405:. Retrieved
401:the original
391:
342:
338:
334:threat model
326:
322:
309:
305:
296:
284:peer-to-peer
280:
266:
264:
257:
237:pseudonymity
224:
220:
216:
215:
199:BSD licenses
73:
64:
49:Please help
33:
1969:Flash proxy
1842:Outline VPN
1832:Shadowsocks
1742:Web proxies
1481:Educational
1286:Sentry 2020
1231:DriveSentry
1151:Google Allo
757:Thunderbird
260:Mix Cascade
2127:Categories
2033:Sneakernet
2003:StealthNet
1837:OnionShare
1720:Principles
1679:Wordfilter
1642:Background
1472:NordLocker
1416:Tahoe-LAFS
1406:Rubberhose
1346:RetroShare
1221:Cryptoloop
1216:CrossCrypt
1196:Comparison
1166:TextSecure
1124:ChatSecure
1086:RetroShare
1076:Bitmessage
1015:strongSwan
801:ChatSecure
712:Claws Mail
702:Apple Mail
474:2011-12-22
384:References
159:Written in
146:2016-12-15
124:2016-12-15
51:improve it
41:verifiable
2075:Reference
2059:FreeWeibo
2054:GreatFire
1974:Mixmaster
1945:Anonymity
1925:Snowflake
1892:Ultrasurf
1866:WireGuard
1855:PirateBox
1313:Anonymity
1303:VeraCrypt
1291:TrueCrypt
1281:Scramdisk
1246:FileVault
1211:BitLocker
1206:BestCrypt
1119:Cryptocat
1025:WireGuard
927:MatrixSSL
897:BoringSSL
859:SecureCRT
821:Profanity
796:Centericq
707:Autocrypt
622:7 January
535:7 January
490:7 January
428:7 January
407:7 January
377:Mixmaster
349:Mixminion
267:ANONdroid
55:citations
2103:Category
1887:Freegate
1861:VPN Gate
1788:DNSCrypt
1694:Facebook
1582:Category
1488:CrypTool
1462:Tresorit
1391:eCryptfs
1351:Ricochet
1251:FreeOTFE
1241:eCryptfs
1226:dm-crypt
1171:WhatsApp
1048:Linphone
1000:Openswan
967:TeamNote
952:SChannel
942:mbed TLS
922:LibreSSL
907:cryptlib
839:Dropbear
752:Sylpheed
717:Enigmail
565:Archived
508:Archived
468:Archived
449:Archived
355:See also
227:, was a
225:JonDonym
2113:Commons
2093:Italics
2013:ZeroNet
2008:Tribler
1993:Freenet
1986:network
1909:Proxify
1882:Lantern
1848:GoAgent
1827:Psiphon
1727:With a
1704:Twitter
1592:Commons
1511:BusKill
1506:USBKill
1457:Freenet
1341:Vidalia
1296:History
1271:PGPDisk
1177:SimpleX
1136:Session
1131:Proteus
1005:OpenVPN
995:Hamachi
972:wolfSSL
962:stunnel
937:OpenSSL
869:wolfSSH
849:OpenSSH
791:BitlBee
737:Outlook
732:Kontact
726:Gpg4win
319:Privacy
271:Android
205:Website
194:License
144: (
122: (
45:neutral
1931:uProxy
1699:GitHub
1564:S/MIME
1411:StegFS
1321:GNUnet
1161:Signal
1109:Matrix
957:SSLeay
912:GnuTLS
864:WinSCP
816:Kopete
767:Secure
277:Design
243:, the
1903:Telex
1783:hosts
1773:HTTPS
1467:Wuala
1441:Qubes
1436:Tails
1381:EncFS
1356:Wickr
1114:OMEMO
1081:Briar
1058:Zfone
1043:Jitsi
947:BSAFE
902:Botan
854:PuTTY
811:Jitsi
806:climm
786:Adium
312:AN.ON
229:proxy
1401:PEFS
1396:LUKS
1371:List
1266:LUKS
1261:geli
1256:GBDE
1053:Jami
1035:ZRTP
1020:Tinc
917:JSSE
624:2017
537:2017
514:2007
492:2017
455:2006
430:2017
409:2017
290:and
253:Java
182:Type
163:Java
43:and
1998:I2P
1959:Tor
1757:PAC
1752:VPN
1747:SSH
1737:P2P
1386:EFS
1336:Tor
1326:I2P
1236:E4M
1101:DRA
1091:Tox
1068:P2P
982:VPN
932:NSS
844:lsh
831:SSH
778:OTR
747:PGP
742:p≡p
722:GPG
345:Tor
329:BKA
292:I2P
288:Tor
233:Web
221:JAP
57:to
2129::
438:^
273:.
1626:e
1619:t
1612:v
1373:)
1369:(
1198:)
1194:(
728:)
724:(
678:e
671:t
664:v
626:.
539:.
494:.
432:.
411:.
219:(
148:)
126:)
80:)
74:(
69:)
65:(
61:.
47:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.