💾 Archived View for tilde.team › ~rami › invizible.gmi captured on 2023-04-20 at 00:37:38. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-01-29)

🚧 View Differences

-=-=-=-=-=-=-

~Rami ₪ SOFTWARE

רמי

SUBJECT: InviZible Pro

AUTHOR: Rami Rosenfeld

DATE: 16/04/22; upd. 23/03/23

TIME: 22.00

LANG: en, ru

LICENSE: GNU FDL 1.3

TAGS: android, f-droid, software, app, man, manual, mobile, free, opensource, tor, dns, dnscrypt, doh, i2p, onion, invizible

INVIZIBLE PRO

Интерфейс

Workstation Global Proxy

Droid

Site

License: GNU General Public License v3.0 or later

INTRO

Запомните: это самая первая(!) и жизненно необходимая программа, которую вы обязаны(!) установить на смартфон сразу же после сброса ОС до заводских установок (при "чистой" установке системы). Лучше и удобнее я пока не встречал.

UPD. В сборке 6.0 на F-Droid значительно повысилась скорость активизации всех трех сервисов, представленных в приложении.

UPD. Выяснилось, что последняя версия программы (равно как и все предшествующие) отличным образом работает в Android 4! Правда, ее невозможно: 1) использовать в качестве фаэрволла; 2) сделать системной службой по умолчанию, но это уже проблемы устаревшей ОС, а не ПО.

NOTE

Comprehensive application for on-line privacy and security. InviZible Pro includes the well known modules DNSCrypt, Tor and Purple I2P. These modules are used to achieve maximum security, privacy and ease of use of the Internet. InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

Features:

- No root required;

- Hides location and IP;

- Unblocks the restricted web content;

- Prevents tracking;

- Allows access to hidden networks;

- ARP spoofing detection;

- Built-in firewall;

- Tethering supported;

- Material design theme.

Just start InviZible Pro, and you turn from a simple user to an invisible one, who is very difficult to find, block or impose unnecessary products and services in the form of ubiquitous advertising on.

However, if you want to get full control over the program and your Internet connection - no problem! InviZible Pro provides access to a large number of both simple and professional settings. You can easily configure InviZible Pro itself, as well as its modules - DNSCrypt, Tor and Purple I2P, to satisfy the most non-standard requirements.

InviZible Pro is an all-in-one program. After installing it, you can easily delete all of your VPN applications and ad blockers. In most cases, InviZible Pro works better, is more stable, and faster than free VPNs. It does not contain ads, bloatware and does not spy upon its users.

InviZible Pro blocks ipv6 due to some security issues with this protocol and the InviZible app.

So what are those three modules, and what do they achieve?

DNSCrypt

DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

- Encrypts DNS requests;

- Protects against DNS spoofing;

- Blocks ads;

- Protects against dangerous and phishing sites;

- Can block "adult" sites;

- Hides visited sites from your provider;

- Prevents some types of resource locks.

Tor

Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

- Encrypts Internet traffic;

- Prevents sites locking;

- Can provide privacy and anonymity;

- Provides access to "onion" sites.

Purple I2P

The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access I2P sites and other Invisible Internet hidden services.

- Encrypts Internet traffic;

- Provides access to the hidden anonymous network Invisible Internet and "i2p" sites.

₪ Back to home ₪

🄯 Rami Rosenfeld, 2022-2023. GNU FDL 1.3.