Censorship Resistant Softwares and Apps

Discover best Censorship Resistant softwares, apps and websites.

Filter by Platform

Platforms:

Censorship Resistant Applications

Sort:
Freegate

Freegate

Free

Freegate is a robust anti-censorship software designed to bypass internet firewalls and access blocked websites securely and anonymously. Developed by Dynamic Internet Technology (DIT), it utilizes dynamic encryption and a network of proxy servers to provide uncensored internet access primarily to users in regions with strict internet controls.

Highly effective in bypassing strict internet censorship.
Anticensorship
Security & Privacy
Shadowsocks

Shadowsocks

Open Source

Shadowsocks is an open-source, lightweight SOCKS5 proxy designed to bypass internet censorship. It provides a secure tunnel between your device and the internet, helping users access blocked content and surf anonymously by encrypting traffic and making it appear as regular HTTPS traffic.

Effective at bypassing sophisticated firewalls like the GFW.
Anticensorship
Development Security & Privacy
UltraSurf

UltraSurf

Free

UltraSurf is a freeware tool designed to help users bypass internet censorship and access blocked websites. It routes traffic through its own network of proxy servers, providing a degree of anonymity and enabling users to circumvent geographical restrictions and firewalls.

Bypasses censorship effectively.
Anticensorship
Security & Privacy
Freenet

Freenet

Open Source

Freenet is a robust, decentralized peer-to-peer platform designed to provide uncensored communication and information sharing. It leverages a distributed data store and a suite of free software applications to enable users to publish and access content anonymously, bypassing censorship and surveillance.

Strong resistance to censorship due to decentralized and distributed architectur...
Anonymity
File Sharing
OnionCat

OnionCat

Open Source

OnionCat is a free and open-source software that creates a virtual network adapter, allowing users to establish encrypted, peer-to-peer connections over the Tor anonymity network. It enables existing applications to communicate anonymously without requiring specific proxy configuration.