AppID: | pan.alexander.tordnscrypt |
Author: | Oleksandr Garmatin |
License: | GPL-3.0-or-later |
Donation: | Webpage |
InRepoSince: | 2019-12-07 |
LastRepoUpdate: | 2024-12-17 |
LastAppUpdate: | 2024-12-16 |
LastVersion: | 2.4.1 |
Categories: | Internet, Security |
APK source: | Github |
Google Play: | Check if it's there |
Protect your device from dangerous sites, get rid of annoying ads and tracking, get access to blocked resources in your country!
InviZible Pro includes the well known modules DNSCrypt, Tor and Purple I2P. These modules are used to achieve maximum security, privacy and ease of use of the Internet.
InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.
Features:
Just start InviZible Pro, and you turn from a simple user to an invisible one, who is very difficult to find, block or impose unnecessary products and services in the form of ubiquitous advertising on.
However, if you want to get full control over the program and your Internet connection - no problem! InviZible Pro provides access to a large number of both simple and professional settings. You can easily configure InviZible Pro itself, as well as its modules - DNSCrypt, Tor and Purple I2P, to satisfy the most non-standard requirements.
InviZible Pro is an all-in-one program. After installing it, you can easily delete all of your VPN applications and ad blockers. In most cases, InviZible Pro works better, is more stable, and faster than free VPNs. It does not contain ads, bloatware and does not spy upon its users.
InviZible Pro blocks ipv6 due to some security issues with this protocol and the InviZible app.
So what are those three modules, and what do they achieve?
DNSCrypt
DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.
¹ Depending on the selected dnscrypt server
Tor
Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.
Purple I2P
The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access I2P sites and other Invisible Internet hidden services.
WhatsNew:
**InviZible Pro beta 2.4.1**
* Display the destination port in real-time logs.
* Socks5 proxy fixes and improvements.
* Improved handling of local networks.
* Tor Browser, OnionShare, Orbot, Briar, Cwtch are excluded from Tor by default as they contain their own Tor instance.
* Fixes and optimizations.