OnionShare alternatives
Looking for an alternative tool to replace OnionShare? During the review of OnionShare we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- MISP (Malware Information Sharing Platform)
- exitmap (Scanner for Tor exit relays)
- Cryptomator (client-side encryption for cloud services)
These tools are ranked as the best alternatives to OnionShare.
Alternatives (by score)
MISP
Introduction
MISP collects, stores, and distributes security indicators and discovered threats. This makes the platform useful for those involved with security incidents and malware research. Users benefit from having a well-tested platform to structure the vast number of data points available when it comes to security threats. The tooling allows interaction with other tools, like security incident and event management (SIEM) and intrusion detection systems (IDS).
Project details
MISP is written in PHP.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
Typical usage
- Fraud detection
- Information gathering
- Threat hunting
exitmap
Introduction
A tool like exitmap might be useful to monitor the reliability and trustworthiness of Tor exit relays. The Tor Project actually uses exitmap to check for false negatives and find malicious exit relays. These are related to the check service page of the project.
Project details
Cryptomator
Introduction
Cryptomator is a multi-platform tool for transparent client-side encryption of your files. It is used together with cloud services to ensure you are the only one who can access the data.Project details
Cryptomator is written in Java.
Strengths and weaknesses
- + More than 10 contributors
- + More than 2000 GitHub stars
- + Many releases available
Typical usage
- Data encryption
socat
Introduction
Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.
Project details
socat is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Data encryption
- Data transfers
Samba
Introduction
Since 1992, Samba provides file and print services based on the server message block (SMB) protocol. This protocol was released by Microsoft as part of the open specifications.
Samba helps with interoperability between systems running Microsoft Windows and those running one of the flavor of Unix like Linux. The toolkit allows systems to become part of the Active Directory environment and join a domain controller or domain member.
Project details
Strengths and weaknesses
- + The source code of this software is available
BleachBit
Introduction
With the help of BleachBit, the system can be kept clean and increase privacy in the process.
Items that can be cleaned by BleachBit include:
- Browser cache
- Cookies
- Internet history
- Temporary files
- Log files
The tool can 'shred' files to ensure the data can no longer be retrieved, opposed to just deleting it.
Project details
Decentraleyes
Introduction
Most websites consist of HTML show the structure of a website. Together with CSS for styling, and JavaScript for interactive functionality, the website can provide value for its visitors. Some of the used JavaScript libraries are heavy on bandwidth, so website owner may use a content delivery network (CDN). The primary goal for a CDN is to get data closer to the end-user, which results in faster downloads and increasing the performance of the website.
Some common JavaScript libraries are used on many websites. As not every single website creator can pay the costs of a CDN, bigger companies might actually sponsor bandwidth on their CDN edge servers. While this is great from a cost perspective, it also introduces a privacy concern. The owner of the CDN can exactly see what websites a user is visiting by looking at the related requests to the CDN and the related referrer. This is where Decentraleyes comes into place, by intercepting requests to content delivery networks (CDN).
Project details
Decentraleyes is written in JavaScript.
Strengths and weaknesses
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Privacy enhancement
MAT (Metadata Anonymisation Toolkit)
Introduction
Many file forms store sensitive data, like a location, author name, or even the date and time. This toolkit can remove these bits of data while allowing the file to be used as before.
Project details
MAT is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Privacy enhancement
Privacy Badger
Introduction
Privacy Badger provides protection against website visitor trackers. These trackers come in the form of beacons or invisible pixels and have the goal to collect information about the browser. This data is often shared by third parties and used to create a profile of a particular browser. As minor differences for each user may lead to an individual user, these third parties may even link some of the data to the related individual. Tools like Privacy Badger do not provide guarantees that they block everything, yet can decrease the amount of data greatly.
Project details
Privacy Badger is written in JavaScript.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
- + Supported by a large company
- + Well-known tool
- - Many provided pull requests are still open
Typical usage
- Privacy enhancement
hBlock
Introduction
For the privacy-aware users, tools like hBlock can be helpful to block malicious domains, malware, advertisements, and trackers. Trackers could be pixels added to websites to track which pages you visited, which might invade your privacy.
Project details
hBlock is written in shell script.
Strengths and weaknesses
- + Used language is shell script
- + The source code of this software is available
Typical usage
- Malware protection
- Privacy enhancement
- Provide anonymity
Some relevant tool missing as an alternative to OnionShare? Please contact us with your suggestion.