- Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request - asking to be added to your contacts list. You can see when your contacts are online, and send them messages (and soon, files!). Your list of contacts is only known to your computer - never exposed to servers or network traffic monitoring. Everything is encrypted end-to-end, so only the intended recipient can decrypt it, and anonymized, so nobody knows where it’s going and where it came from.
- SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org)
- Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. Please check the available documentation before using Tor.
- Tor Browser
- Tor Browser, previously known as Tor Browser Bundle (TBB), is the flagship product of the Tor Project. It consists of a modified Mozilla Firefox ESR web browser, the TorButton, TorLauncher, NoScript and HTTPS Everywhere Firefox extensions and the Tor proxy. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
- Tor Child Abuse Block
- Filters Tor .onion domains via the Blacklist given at ahmia.fi. Tor offers a way to anonymously host your internet service via its hidden services. The Tor search engine ahmia.fi provides its child abuse block list. Each hidden service domain is checked whether it belongs to that list. If yes, a (simple) block message is displayed.
- Tor Control
- This extension starts Tor executable in a background and on successful connection, redirects all your traffic through Tor anonymous network to increase user privacy. Also when Tor is connected, WebRTC is disabled to prevent IP leakage. Note that for the extension to run Tor executable, you will need to install a minimal NodeJS executable. This is a bridge connector to allow the extension to execute Tor commands. It is possible to request new identity (new IP) right from the extension toolbar panel. Also since the extension uses its own communication port, there will be no conflict with other running instances of Tor (like Tor Browser). Please read FAQ #1 in the following page to prepare the extension to use Tor. For now, Tor bundle is prepared for Mac OS and Windows. FAQs page: http://add0n.com/tor-control.html If you have a suggestion to improve this extension or have found a bug please report on https://github.com/andy-portmen/tor-bundle/
- The software originally developed by Aaron Swartz and Virgil Griffith is now developed and mainteined by the Hermes Center for Transparency and Digital Human Rights as part of the (GlobaLeaks) project.
- The TorBirdy extension configures Mozilla Thunderbird (Icedove and possibly other related Mozilla mail clients) to make connections over the Tor anonymity network. It also takes steps to protect anonymity at the application level by reducing unique identifiers, disabling unsafe plugins, disabling insecure protocols, helpfully configuring other software such as Enigmail and GnuPG in anonymity protecting ways and more.
- TorK is a Tor Controller for KDE. It allows you to configure, run, and update Tor. It also allows you to view the Tor network and choose how you would like to interact with the it.
- Torsocks allows you to use most SOCKS-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you're using.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.