InviZible Pro: Tor & Firewall, DNSCrypt & I2P vs Lavabit Encrypted Proxy

Side-by-side comparison of two open source alternatives

InviZible Pro: Tor & Firewall, DNSCrypt & I2P

Preserves privacy, prevents tracking, and provides access to restricted and hidden online content. InviZible Pro combines the strengths of Tor, DNSCrypt, and Purple I2P to provide a comprehensive solution for online privacy, security, and anonymity. Tor is responsible for privacy and anonymity. It acts like an unlimited free VPN proxy, but does so in the most secure way possible. Tor uses military-grade encryption and routes your internet traffic through a network of volunteer-run proxy servers. This helps protect your identity and location by hiding your IP address. It allows you to browse the internet anonymously, access websites that are otherwise restricted, and communicate privately. Tor also allows access to websites hosted on the Tor network, known as "onion services" or dark web, which are not accessible through regular browsers. DNSCrypt is responsible for security. Every phone uses DNS (Domain Name System) when visiting online resources. But this traffic is usually not encrypted and can be intercepted and spoofed by third parties. DNSCrypt ensures that your DNS traffic is encrypted and secure. It prevents unauthorized access and tampering of your DNS queries, providing an additional layer of protection against surveillance and data interception. I2P (Invisible Internet Project) provides secure and anonymous access to internal I2P websites, chat forums and other services that are not available through regular browsers. You may know it as the deep web. It works by routing your internet traffic through a network of volunteer-run proxy servers, allowing you to hide your identity and location. I2P provides a secure and private online environment, making it a great option for those who value anonymity and privacy. Firewall is a security feature that helps protect your device from unauthorized access and potential threats. It acts as a filter for incoming and outgoing network traffic, allowing you to control which apps can access the internet. By setting up firewall rules, you can choose to block or allow internet connection for individual apps. This helps enhance your privacy and security by preventing unauthorized communication and protecting your data while using your phone. InviZible Pro can utilize root access, if available on your device, or use a local VPN to deliver internet traffic directly to the Tor, DNSCrypt, and I2P networks. Core Features: ✔ Tor Network - Achieve full anonymity, bypass censorship, and access .onion sites securely ✔ DNSCrypt - Encrypt DNS queries to prevent ISP monitoring and manipulation ✔ I2P (Invisible Internet Project) - Secure and private decentralized networking ✔ Advanced Firewall - Restrict internet access per app and block unauthorized connections ✔ No Root Access Required - Works seamlessly on all devices without modifications ✔ Maintain complete privacy without a paid VPN - Stay anonymous for free ✔ Stealth Mode - Evade Deep Packet Inspection (DPI) and regional restrictions ✔ Free & Open Source - No ads, no tracking, no compromises

Lavabit Encrypted Proxy

The Lavabit encrypted proxy service is a simple to use, super fast, completely secure service. The service is a completely free public service. No user account or personal information required. It's simply our way ensuring you no longer have any excuse to let anyone log and bog you (down with ads). Why should you use the Lavabit Encrypted Proxy? * We do not record anything about how you use the Internet * We do not invade your display with ads * We do not sell, give or share your data with anyone * We do not have any limits on how much or how fast you can download * We do not require a user account * We do not charge anything for this free service * We use fully encrypted physical servers to provide you with the best service • We safely mask IPv4 and IPv6 traffic * We use strong encryption to provide PERFECT FORWARD SECRECY for your surfing sessions. How does Lavabit Encrypted Proxy work? With the Lavabit Encrypted Proxy, we use Virtual Private Networking (VPN) technology to provide an encrypted pipeline for all your Internet traffic. It's a secure tunnel between your computer and the Internet backbone. Right past any peepers that might be up to no good. From our servers, you can access the Internet without censorship, or surveillance. What's more, the websites and servers you access will no longer see your identity, or rather your IP address, but will instead see the generic proxy address we provide. Using a Lavabit Encrypted Proxy is a great first step toward protecting your privacy, and taking backing control over what personal information you share, and with whom. Note, both the app and backend services have been built using F/OSS software, however this specific app variant is tied specifically to the VPN servers operated by Lavabit.

FeatureInviZible Pro: Tor & Firewall, DNSCrypt & I2PLavabit Encrypted Proxy
LicenseGPL-3.0-or-laterGPL-3.0-only
Install sources
F-DroidGitHub
F-DroidGitHub
Categories
Password ManagerVPNFirewallBrowser
Password ManagerVPNBrowser
Features
Ad-FreeOpen SourceNo Tracking
Ad-FreeOpen SourceNo Tracking
Platforms
Android
Android
Website
Source code