Top 15 Autistici / Inventati Alternative and Similar Softwares | May 2024

A/I provides tools for anonymous communication and sharing. We recommend to use our services along with some specific personal privacy protection tool

All our services are characterized by a peculiar attention to our users' privacy. That's why we keep no logs of connections and we don't record any direct information matching services, identities and users' names. Furthermore, we warmly support the use of the encryption connection tools we offer to everybody (remember this when you configure your mail client and update your website!).
Provides a wide range of communication services such as: Email, Blogs, Mailing lists, Newsletters and Forums, Web Hosting, Instant Messaging and Chat, Anonimity Services and Personal VPNs, Software project hosting
...

1. IO

IO IO (Bold.io ) is a lightweight and powerful writing tool where you can publish your thoughts anonymously, under a pseudonym, or as yourself. It's totally up to you.IO provides an ultra-fast publishing experience with a powerful but easy to use editor that stays out of your way unless you need......

2. TempMail

TempMail Forget about spam, advertising mailings, hacking and attacking robots. Keep your real mailbox clean and secure. TempMail provides temporary, secure, anonymous, free, disposable email address.......

3. Fake Mail Generator

Fake Mail Generator The Fake Mail Generator is an absolutely free disposable email system. By simply visiting this site the above address has already been activated. Enter it into any form on a website that requires email verification, and when the email is received it will pop up instantly on this page.The Fake......

4. InboxCube

InboxCube For us Email is our lives. At the heart of our inbox lives a personal network of information and content that privately defines who we are. We believe that something as integral as email has been left behind in the current mobile revolution. Mobile changed everything and we are driven......

5. Mintemail

Mintemail MintEmail.com is a no-click disposable email system. By simply visiting this site, you will be assigned a temporary email address. Use it on a website that requires email verification and when the email is received it will pop up instantly in this box. Once your email is received, the title......

6. DispoMail.eu

DispoMail.eu DispoMail.eu offers you access to anonymous disposable email addresses preventing you from spam in your regular inbox. Use your DispoMail.eu address for whatever you like.......

7. Mail.be

Mail.be Sorry, we have added any description on Mail.be......

8. Digitata

Digitata Digitata is an open-source ad hoc routing network that welcomes membership and contribution by others.......

9. NOCC

NOCC NOCC is a webmail client written in PHP. It provides webmail access to IMAP and POP3 accounts.......

10. OnionCat

OnionCat OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It allows users to anonymously access Internet services. It transmits any kind of IPv6-based data transparently through the TOR network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. OnionCat......

11. MailNesia

MailNesia Fully featured disposable email provider that clicks on activation links. Just like a real email service but without any password or registration.......

12. MailEnable

MailEnable MailEnables mail server software provides a powerful, scalable hosted messaging platform for Microsoft Windows.......

13. Tor-ramdisk

Tor-ramdisk Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to construct encrypted virtual tunnels which are randomly relayed between Tor servers (nodes) until the connection......

14. Centrify

Centrify Centrify provides Unified Identity Services across data center, cloud and mobile — resulting in one single login for users and one unified identity infrastructure for IT. Centrify's software and cloud services let organizations securely leverage their existing identity infrastructure to centrally manage authentication, access control, privilege management, policy enforcement and......

15. Phantom

Phantom The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind:1. Completely decentralized.2. Maximum resistance against all kinds of DoS attacks.3. Theoretically secure anonymization.4. Theoretically secure end-to-end transport encryption.5. Completely (virtually) isolated from the "normal" Internet.6. Maximum......