Select Page

The free services that we offer

All the below services that we offer are free for everyone and don’t contain any advertising. They respect your privacy and don’t exploit your data for commercial gain. We count on the generosity of our donators and our members to keep offering these services.

Diaspora

The social network is not owned by any one person or entity, keeping it from being subject to corporate take-overs or advertising. In September 2011 the developers stated, “…our distributed design means no big corporation will ever control Diaspora. Diaspora* will never sell your social life to advertisers, and you won’t have to conform to someone’s arbitrary rules or look over your shoulder before you speak.”

If you like liberty, you’ll like Diaspora*

Mastodon

How it works ?

Everyone can host a Mastodon server. Every server hosts its own accounts, the content that they produce,  and the content that they subscribe to.

Everyone has a unique global identifier (like @nickname@exemple.com) composed of a nickname (@nickname) and of the domaine name of the server where he resides (exemple.com).

The users can follow each other, no matter where they are hosted : when someone follows someone else from another instance, the server then subscribes to that instance and will receive all new messages.

Why it’s cool ?

The servers work independently, thanks to different people and organizations, applying different moderation and good behavior rules, so that you can find the instance that suits you best. A decentralized network is very complicated to censor. If an instance goes down or start acting in an non-ethical manner, the network will not be cut, it will stay forever and you don’t have to worry about losing your friends and your audience by switching server.

Wallabag

Save and classify articles. Read them later. Freely

Tor

 

How it works ?

To create a private network pathway with Tor, the user’s software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can’t trace these connections as they pass through.

 

Why it’s cool ?

Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re traveling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

The websites that we propose as a Tor version:

Verify the state of our Tor relay: FairTorRelay

Download the Tor browser: Tor Browser