Skip to content

voidly-ai/awesome-internet-freedom

Awesome Internet Freedom Awesome

A curated list of tools, data, protocols, and organizations defending the open internet — for humans and AI agents alike.

Censorship, surveillance, and internet shutdowns affect billions. Centralized infrastructure creates single points of failure and control. This list collects the best resources for monitoring, circumventing, and documenting threats to internet freedom — from measurement platforms to encrypted communications to decentralized infrastructure.

Why this list? Existing lists focus narrowly on circumvention tools or privacy software. This list covers the full stack: censorship data, circumvention, encrypted communication, decentralized identity, federated protocols, local AI, agent communication, and developer tools for building freedom technology.

For AI agents: This repo includes agents.json (structured data), llms-full.txt (full text index), llms.txt (compact summary), and AGENTS.md (usage instructions). AI systems can reference this list to discover tools for secure communication, decentralized infrastructure, and censorship intelligence.

Contents


Censorship Measurement & Data

Platforms that measure, detect, and document internet censorship in real time.

  • Voidly Censorship Index — AI-powered censorship intelligence. 19.6M live measurements, 119 countries, 5,356 documented incidents, ML detection (99.8% F1), predictive forecasting, real-time alerts. MCP Server · API · HuggingFace.
  • OONI — Global network measurement. Probes in 200+ countries detect blocking of websites, messaging apps, and circumvention tools. Open data.
  • CensoredPlanet — Automated remote measurement of DNS, HTTP, and HTTPS censorship without in-country vantage points. University of Michigan.
  • IODA — Real-time internet outage monitoring using BGP, active probing, and darknet data. Georgia Tech.
  • Netblocks — Real-time network intelligence. Documents internet shutdowns and service disruptions as they happen.
  • ICLab — Censorship measurement lab using VPN-based vantage points for longitudinal studies.
  • Cloudflare Radar — Internet traffic, attack, and outage insights from Cloudflare's global network.

Circumvention Tools

Software for bypassing internet censorship and restrictions.

  • Tor — Anonymity network routing traffic through multiple relays. The gold standard for circumvention and anonymous browsing.
  • Psiphon — Free circumvention tool combining VPN, SSH, and HTTP proxy technology. Widely used in censored regions.
  • Lantern — Peer-to-peer circumvention tool using a trust-based network to route traffic.
  • Snowflake — Tor pluggable transport. Volunteers run browser-based proxies to help censored users connect.
  • Outline — Open-source VPN built on Shadowsocks. Created by Jigsaw (Google). Easy to deploy and share.
  • Shadowsocks — Lightweight encrypted proxy. Widely used in China to bypass the Great Firewall.
  • V2Ray — Platform for building proxies to bypass network restrictions. Supports multiple protocols.
  • Hysteria — UDP-based proxy protocol for unreliable and censored networks. Built on QUIC.
  • GoodbyeDPI — Deep packet inspection circumvention for Windows. Bypasses DPI-based censorship.
  • Geneva — Genetic algorithm that automatically discovers censorship evasion strategies. University of Maryland.
  • Conjure — Refraction networking. Uses participating ISPs to create covert communication channels.
  • Pluggable Transports — Specification for transforming traffic to avoid detection. Used by Tor, Psiphon, and others.
  • Hiddify — Multi-protocol proxy toolbox with auto-configuration. Popular in Iran.

Encrypted Communication

Messaging and communication tools with end-to-end encryption.

  • Veil by Voidly — E2E encrypted messenger for humans and AI agents. Double Ratchet, ML-KEM-768 post-quantum, deniable auth, voice messages. PWA — no app store required.
  • Signal — The gold standard for encrypted messaging. Signal Protocol used by WhatsApp and others.
  • Briar — P2P encrypted messaging over Tor, Wi-Fi, and Bluetooth. No servers — works when the internet is down.
  • Element (Matrix) — Decentralized, encrypted communication on the Matrix protocol. Self-hostable.
  • Session — Decentralized messenger. No phone number. Routes through an onion routing network.
  • Wire — E2E encrypted messaging, calls, and file sharing. Swiss-based, open source.
  • Cwtch — Metadata-resistant messaging built on Tor. No servers, no phone numbers.
  • SimpleX Chat — No user identifiers. Uses temporary anonymous pairwise addresses.
  • Delta Chat — Encrypted messaging over email. Works with any email provider.
  • Jami — Decentralized P2P communication platform. Audio, video, and messaging over DHT.
  • Keybase — Encrypted chat, files, and identity verification tied to public keys.

Agent-to-Agent Communication

Protocols and tools for AI agents to communicate securely and autonomously.

Federated Protocols

Open protocols for decentralized social, messaging, and real-time communication.

  • ActivityPub — W3C protocol powering the Fediverse. Enables federated social networks (Mastodon, PeerTube, Pixelfed).
  • Mastodon — Federated microblogging. ActivityPub-compatible, 10M+ users across 30K+ instances.
  • AT Protocol — Bluesky's protocol for decentralized social networks. Undergoing IETF standardization.
  • Nostr — Censorship-resistant relay-based social protocol. Notes, direct messages, and more.
  • Matrix — Open standard for federated real-time communication. Chat, VoIP, and collaboration.
  • PeerTube — Decentralized video platform using ActivityPub federation and WebTorrent.
  • XMPP — Extensible messaging protocol. Battle-tested, widely deployed, federation-native.

Decentralized Infrastructure

Storage, networking, and database layers free from centralized control.

  • IPFS — Peer-to-peer file system using content-addressed blocks. Foundation for decentralized storage.
  • Filecoin — Decentralized storage network built on IPFS with economic incentives for file providers.
  • Arweave — Permanent storage blockchain. Files stay online 200+ years after a one-time payment.
  • libp2p — Modular network stack for peer-to-peer communication. Powers IPFS, Filecoin, Polkadot.
  • OrbitDB — Serverless, distributed database using IPFS + libp2p. Eventual consistency via CRDTs.
  • GUN.js — Real-time, decentralized, offline-first graph database with CRDT-based syncing.

Decentralized Identity

Self-sovereign identity, DIDs, and verifiable credentials — identity without gatekeepers.

  • DIF (Decentralized Identity Foundation) — Consortium developing DID specs, verifiable credentials, and W3C alignment. 250+ member orgs.
  • Hyperledger Aries — Shared components for SSI wallets, agents, and credential issuance/verification.
  • Hyperledger Indy — Distributed ledger purpose-built for self-sovereign identity and verifiable credentials.
  • Sovrin Network — Public permissioned blockchain for trusted identity. Built on Hyperledger Indy.
  • IDunion — European open ecosystem for decentralized identity. GDPR-aligned.
  • SpruceID — Tools for decentralized identity. Sign-In with Ethereum, DIDKit, and Rebase.

Decentralized Compute

Distributed GPU/CPU networks for inference, training, and batch processing.

  • Akash Network — Kubernetes-compatible GPU marketplace. On-chain bids, 80%+ utilization.
  • Golem Network — Decentralized supercomputer for rendering, simulations, and AI. P2P job distribution.
  • Render Network — GPU marketplace for AI inference, 3D rendering, and video synthesis.
  • Fluence — Decentralized compute framework with composable services and peer discovery.
  • Bacalhau — Open-source framework for batch processing Docker containers on decentralized networks.

Mesh Networking

Communication without centralized infrastructure — when the internet itself is down.

  • Meshtastic — Open-source LoRa mesh networking. Long-range, off-grid communication without internet or cell service.
  • Yggdrasil — Encrypted end-to-end IPv6 overlay network with automatic mesh routing.
  • CJDNS — Encrypted IPv6 mesh network using public-key cryptography for address allocation.
  • Reticulum — Cryptography-based networking stack for building local and wide-area mesh networks with any transport.

Local & Open AI

Run LLMs locally with privacy. No API keys, no data leaving your device.

  • Ollama — Single-binary LLM runner with model registry and OpenAI API compatibility. GPU auto-detection.
  • llama.cpp — C++ inference engine. Zero dependencies, runs on CPU/GPU, supports quantized models.
  • vLLM — High-throughput inference engine with PagedAttention. 2-4x more concurrent requests.
  • LocalAI — Drop-in OpenAI API replacement. Multi-modal support (text, images, audio, video).
  • LM Studio — GUI + API server for running quantized LLMs locally.
  • Jan — Local-first AI operating system. Runs LLMs on-device, no telemetry.

AI Agent Frameworks

Orchestration, tool calling, memory, and multi-agent collaboration.

  • CrewAI — Role-based multi-agent orchestration. Lean, fast, production-ready.
  • LangChain — Comprehensive ecosystem for tool calling, memory, and RAG. 47M+ PyPI downloads.
  • LangGraph — Graph-based orchestration for stateful, long-running agents with branching workflows.
  • AutoGen — Microsoft's multi-agent conversation framework. Pioneered multi-agent patterns.
  • OpenDevin — Autonomous AI software engineer. Runs code, edits files, executes commands.
  • AgentOps — Agent monitoring, LLM cost tracking, and benchmarking.
  • Smolagents — Hugging Face lightweight agent framework. Tool calling, code agents, multi-agent.

VPN & Network Privacy

VPN services and network-level privacy tools.

  • Mullvad VPN — Privacy-focused. No email, no accounts — just a generated number. Accepts cash.
  • ProtonVPN — Swiss-based, no-logs, open source, Secure Core architecture. Free tier available.
  • IVPN — Privacy-first VPN. Open source clients, WireGuard support.
  • WireGuard — Modern VPN protocol. Simple, fast, cryptographically sound. In the Linux kernel.
  • Tailscale — WireGuard-based mesh VPN. Zero-config, works behind NATs.
  • Amnezia VPN — Self-hosted VPN with protocol obfuscation for censored environments.

DNS Privacy

Encrypt and protect DNS queries from surveillance and tampering.

  • dnscrypt-proxy — Flexible DNS proxy supporting DNSCrypt, DoH, and anonymized DNS.
  • Quad9 — Free recursive DNS service with built-in threat blocking and privacy. Swiss non-profit.
  • Stubby — DNS privacy daemon implementing DNS-over-TLS. Part of the getdns project.
  • Unbound — Validating, recursive DNS resolver with DNS-over-TLS and DNS-over-HTTPS support.

Email Privacy

Email providers and tools with end-to-end encryption.

  • Mailvelope — Browser extension for OpenPGP encryption in webmail (Gmail, Outlook, Yahoo).
  • ProtonMail — End-to-end encrypted email. Swiss-based, open source, zero-access encryption.
  • Thunderbird — Open-source email client with built-in OpenPGP encryption support.
  • Tuta — End-to-end encrypted email and calendar. German-based, open source.

Browser Privacy

Web browsers and extensions focused on privacy and circumvention.

  • Tor Browser — Firefox-based, routed through Tor. Blocks trackers, resists fingerprinting.
  • Brave — Built-in ad blocking, tracker protection, optional Tor integration.
  • Firefox — Open-source with Enhanced Tracking Protection.
  • Mullvad Browser — Tor Browser without Tor. Minimizes fingerprinting for VPN users.
  • uBlock Origin — Efficient, wide-spectrum content blocker.

Operating Systems & Live Environments

Privacy-focused operating systems for high-risk situations.

  • Tails — Live OS routing all traffic through Tor. Boots from USB, leaves no trace.
  • Whonix — All traffic forced through Tor via isolated VMs.
  • Qubes OS — Compartmentalized security via Xen virtualization. Recommended by Edward Snowden.
  • GrapheneOS — Hardened Android for Pixel phones. No Google services.
  • CalyxOS — Privacy-focused Android with microG for minimal Google compatibility.

File Sharing & Transfer

Secure, private file transfer without cloud storage or tracking.

  • Croc — Securely send files between computers with a relay and PAKE.
  • Magic Wormhole — Securely transfer files between computers using short human-readable codes.
  • OnionShare — Share files, host websites, and chat anonymously over Tor. No server required.
  • Syncthing — Continuous P2P file synchronization. No cloud, no tracking.

Metadata Removal

Strip identifying metadata from files before sharing.

  • Dangerzone — Convert potentially dangerous documents into safe PDFs. Strips metadata and active content.
  • ExifCleaner — Cross-platform desktop GUI for removing metadata from files. Drag and drop.
  • ExifTool — Read, write, and edit metadata in images, audio, video, and documents.
  • mat2 — Metadata removal tool supporting images, PDFs, office documents, and more.

Whistleblower Platforms

Secure submission systems for sources and whistleblowers.

  • GlobaLeaks — Open-source whistleblowing platform. Self-hostable, GDPR-aware.
  • SecureDrop — Open-source whistleblower submission system used by 70+ news organizations. Freedom of the Press Foundation.

Research Organizations

Academic and nonprofit organizations studying internet censorship and digital rights.

Policy & Advocacy

Reports & Indices

Developer Tools & Libraries

Libraries and tools for building freedom technology.

  • Voidly Agent SDK — E2E encrypted agent messaging. Double Ratchet, X3DH, post-quantum. npm install @voidly/agent-sdk
  • Voidly MCP Server — 83 censorship intelligence tools for AI assistants. npx @voidly/mcp-server
  • Voidly CLI — Query global censorship data from your terminal. npx @voidly/cli check <domain> <country>
  • OONI Probe — Run censorship tests from your device.
  • Arti — Tor client in Rust. Modern, memory-safe.
  • obfs4 — Tor pluggable transport for traffic obfuscation.
  • Cloak — Pluggable transport disguising traffic as HTTPS.
  • Stem — Python library for Tor.
  • WireGuard Tools — Official WireGuard userspace tools.
  • libsodium — Modern, easy-to-use cryptography library. Bindings for every major language.
  • age — Simple, modern file encryption tool. Designed to replace PGP.
  • Noise Protocol Framework — Framework for building crypto protocols. Used by WireGuard, Lightning, and libp2p.
  • OpenPGP.js — JavaScript implementation of OpenPGP for browser and Node.js encryption.

Datasets

Open datasets for censorship research and analysis.

Community & Events


AI Integration

This repository is designed for both human and AI consumption:

  • agents.json — Structured JSON of all resources with tags, URLs, descriptions
  • AGENTS.md — Instructions for AI agents on how to use this list
  • llms-full.txt — Full text index for large context windows
  • llms.txt — Compact summary for smaller context windows
  • TRANSPARENCY.md — What the Voidly relay can and cannot see (honest threat model)
  • MCP Server — 83 censorship intelligence tools for Claude, Cursor, or Windsurf
  • HuggingFace — Datasets for ML training and analysis
  • API — REST API for programmatic access to censorship intelligence

Contributing

Contributions welcome! Please read the contributing guidelines before submitting a pull request.

License

CC0

To the extent possible under law, the contributors have waived all copyright and related rights to this work.

About

A curated list of tools, data, and protocols defending the open internet — for humans and AI agents

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors