InviZible Pro
OS :
Version :5.8.0
Size :
Updated :Jun 30,2022
Developer :Garmatin Oleksandr
Ask AI
You can ask the AI some questions about the app
Based on online discussions, here are three topics related to the Tordnscrypt app: 1. "How does Tordnscrypt VPN handle VPN protocol and encryption?" 2. "Does Tordnscrypt provide secure and reliable access to geo-restricted content?" 3. "What are the pros and cons of using Tordnscrypt vs other VPN apps?" Let me know if you'd like me to expand on these topics or ask further questions!
Q{{(index+1)}}{{item}}Ask AI
Pros and Cons from users' feedback
{{conclusionsAiError}}Retry request
App Downloads
App Survey
  • Why do you uninstall an app?
      Submission Failed, try again
  • Do you prefer more comprehensive software
      Submission Failed, try again
  • Can your phone delete the useless apps that come with your phone?
      Submission Failed, try again
  • What is the number of APPs on your phone?
      Submission Failed, try again
Description
Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.


Features:
* No root required
* Hides location and IP
* Unblocks the restricted web content
* Prevents tracking
* Allows access to hidden networks
* ARP spoofing detection
* Built-in firewall
* Tethering supported
* No analytics
* No advertisements
* Open source
* Material design theme

Premium feature:
* Material design night theme


- InviZible Pro does not support ipv6 at this time.

Please visit the project’s help page to understand better how to use this application: https://invizible.net/en/help

Take a look at source code https://github.com/Gedsh/InviZible
{{descriptionMoreText}}
Comments (0)
{{commentText.length}}/{{maxCommentText}}
{{commentError}}{{commentUserError}}
Failed to load data, try again
  • {{comment.commentUser.substring(0, 1)}}
    By {{comment.commentUser}}{{comment.commentDateString}}
    {{comment.comment}}