Users means of anonymization presence in the Tor network for a long time felt invulnerable superhuman. And then came the trailer with FBI agents and all the "anonymous" was taken to jail. As it turned out, blame Tor, which gave a false sense of security, but in fact did not provide serious protection. Before fans of anonymity acutely the question: what to use now?
For today there are the following alternatives:
*Invisible Internet Project (I2P).
All three technologies are also not able to provide absolute protection. For example, the creators of I2P and are recognized: de anonymization complicated, but still possible (No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount). But there is no better.
Invisible Internet Project is quite cleverly arranged distributed network based on Kademlia DHT. In addition to the decentralized structure, the network I2P interesting self-similar DNS and intensive use of asymmetric encryption. Inside I2P have their own sites, and network users are guaranteed anonymity (not absolute).
Program to work in the Invisible Internet Project written in Java that allows you to use I2P on any device and any operating system. Installation is simple: you need to download the JAR file from the official website and run it:
java -jar i2pinstall_0.9.17.jar
Another distributed network. Used for anonymous storage and data access. Something like anonymous torrent. As I2P, Freenet uses the installer for Java:
cd /tmp && wget 'https://freenetproject.org/jnlp/freenet_installer.jar' -O new_installer_offline.jar java -jar new_installer_offline.jar
Unlike free I2P and Freenet, the VPN will have to pay. From $ 5 per month and above. VPN is a virtual private network. Under this clever phrase is a very simple idea. You are accessing the Internet through a computer intermediary. The relationship with the intermediary securely (but not reliably) is encrypted, so neither the provider nor the intelligence agencies are not able to read incoming and outgoing traffic. But the owner of the VPN server can read all your traffic. And do it, if it will put pressure state bulldogs or he will see the financial benefits. Makes sense to have multiple servers, and intermediaries in different countries.
As you can see from above, the absolute anonymization network operation can only provide well-edged axe, which the user must cut the Internet cable before connecting.