Some Anonymous Proxy Tools

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers and hackers from viewing your email, instant messages, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use.

FreeGate is a free anti-censorship software for secure and fast Internet access. It is a Windows application that runs on most Windows platforms from Windows 98 to Vista, as well as on Linux and MAC through http://www.winehq.org/ . Freegate is developed and maintained by the Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention technologies. It implemented the third generation, F3 tunnel, encryption technology.

Picidae is an art project, that deals with ones own horizons of imagination, the image of the world, communication and its hurdles and barriers. picidae negotiates the firewall (Internet censorship) eg. in China or in the Arabian states. picidae delivers a complete, readable and even clickable image of the censored web sites.

SSH Tunnel, in fact, is not a software/tool, but a technique for transfering data from user to server with SSH Technology. However, it was not an anonymous way to server. it encrypts the data transfering between user and SSH server, but the data transfer is not encrypted between SSH server and web server if the web server does not provide SSH.

   Send article as PDF   

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.