category
Anonymity networks
Network protocols designed to hide who you are from your ISP, the destination service, and the network operators in between. Tor is the reference. I2P and Lokinet are independent designs with different threat models; Yggdrasil is a mesh-friendly overlay. The trade-off versus a commercial VPN is operator-free routing at the cost of higher latency and a smaller anonymity set on lesser-used networks.
Related on the site
Topic hubs
Quick answers
What to look for
Use the table below as a starting point. The same rules apply across the site: every claim is dated, sources are linked from each service page, and a service with tiered KYC is no-KYC only up to a threshold that the operator can change at any time. See methodology for how we evaluate entries.