InviZible Pro: increase your security, protect you
InviZible Pro includes the well known modules DNSCrypt, Tor and Purple I2P. These modules are used to achieve maximum security, privacy and ease of use of the Internet.
InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.
Features:
* No root required
* Hides location and IP
* Unblocks the restricted web content
* Prevents tracking
* Allows access to hidden networks
* ARP spoofing detection
* Built-in firewall
* Tethering supported
* Material design theme
Just start InviZible Pro, and you turn from a simple user to an invisible one, who is very difficult to find, block or impose unnecessary products and services in the form of ubiquitous advertising on.
However, if you want to get full control over the program and your Internet connection - no problem! InviZible Pro provides access to a large number of both simple and professional settings. You can easily configure InviZible Pro itself, as well as its modules - DNSCrypt, Tor and Purple I2P, to satisfy the most non-standard requirements.
InviZible Pro is an all-in-one program. After installing it, you can easily delete all of your VPN applications and ad blockers. In most cases, InviZible Pro works better, is more stable, and faster than free VPNs. It does not contain ads, bloatware and does not spy upon its users.
InviZible Pro blocks ipv6 due to some security issues with this protocol and the InviZible app.
So what are those three modules, and what do they achieve?
DNSCrypt
DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.
* Encrypts DNS requests
* Protects against DNS spoofing
* Blocks ads¹
* Protects against dangerous and phishing sites¹
* Can block "adult" sites¹
* Hides visited sites from your provider
* Prevents some types of resource locks
¹ Depending on the selected dnscrypt server
Tor
Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.
* Encrypts Internet traffic
* Prevents sites locking
* Can provide privacy and anonymity
* Provides access to "onion" sites
Purple I2P
The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access I2P sites and other Invisible Internet hidden services.
* Encrypts Internet traffic
* Provides access to the hidden anonymous network Invisible Internet and "i2p" sites
- Author: Oleksandr Garmatin
- License: GNU General Public License v3.0 or later
- Issue Tracker
- Translation
- Source Code
- Changelog
- Build Metadata
Donate
Versions
Although APK downloads are available below to give you the choice, you should be aware that by installing that way you will not receive update notifications and it's a less secure way to download. We recommend that you install the F-Droid client and use that.
Download F-Droid-
armeabi-v7a
This version requires Android 4.4 or newer.
It is built and signed by F-Droid, and guaranteed to correspond to this source tarball.
Download APK 22 MiB PGP Signature | Build Log
-
armeabi-v7a
This version requires Android 4.4 or newer.
It is built and signed by F-Droid, and guaranteed to correspond to this source tarball.
Download APK 21 MiB PGP Signature | Build Log
-
armeabi-v7a
This version requires Android 4.4 or newer.
It is built and signed by F-Droid, and guaranteed to correspond to this source tarball.
Download APK 20 MiB PGP Signature | Build Log