SocialVPN - P2P VPN that connects you to your friends computer

  •        1248

SocialVPN is an open-source IPOP-based virtual network that connects your computers privately to your friends’ computers. It automatically maps online social network relationships using Jingle and XMPP to create your own user-defined peer-to-peer VPNs – with no hassle, and supporting unmodified TCP/IP applications.

In the SocialVPN, each user is in control of who their VPN connects to. To scale to large online social networks, SocialVPN employs a unique dynamic IPv4 address allocation/translation approach that avoids conflicts with local networks and devices outside a user’s social network. creates a communication overlay that can be used as a basis to design decentralized Online Social Networks (OSNs). It keeps the data sharing private.

http://ipop-project.org/socialvpn/
https://github.com/ipop-project/Tincan http://code.google.com/p/socialvpn

Tags
Implementation
License
Platform

   




Related Projects

PeerVPN - the open source peer-to-peer VPN

  •    C

PeerVPN is a software that builds virtual ethernet networks between multiple computers. Such a virtual network can be useful to facilitate direct communication that applications like file sharing or gaming may need. Often, such direct communication is made impossible or very difficult by firewalls or NAT devices.

SoftEther VPN - Cross-platform Multi-protocol VPN Program

  •    C

SoftEther VPN is a ?Cross-platform Multi-protocol VPN Program. It supports SSL-VPN protocol to penetrate any kinds of firewalls. Ultra-optimized SSL-VPN Protocol of SoftEther VPN has very fast throughput, low latency and firewall resistance. Virtualization of Ethernet devices is the key of the SoftEther VPN architecture. It virtualizes Ethernet devices in order to realize a flexible virtual private network for both remote-access VPN and site-to-site VPN.

Tinc - a VPN daemon

  •    C

tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. All traffic is optionally compressed using zlib or LZO, and LibreSSL or OpenSSL is used to encrypt the traffic and protect it from alteration with message authentication codes and sequence numbers.

ZeroTierOne - A Smart Ethernet Switch for Earth

  •    C++

ZeroTier is a smart programmable Ethernet switch for planet Earth. It replaces the physical LAN/WAN boundary with a virtual one, allowing devices of any type at any location to be managed as if they all reside in the same cloud region or data center. All traffic is encrypted end-to-end and takes the most direct path available for minimum latency and maximum performance. The goals and design of ZeroTier are inspired by among other things the original Google BeyondCorp paper and the Jericho Forum.

ClearOS - Linux based Operating System

  •    C

ClearOS is a powerful network and gateway server designed for small organizations and distributed environments. The open source revolution in the software industry has made it possible to provide ClearOS at no cost. Among other features, antivirus, antispam, VPN and content filtering are built right into the software -- no need for expensive third party add-ons. With ClearOS, you can avoid costly vendor lock-in and proprietary formats; instead, you can embrace open standards and protocols.


strongSwan - IPsec-based VPN Solution

  •    C

strongSwan is an OpenSource IPsec implementation. IPSec is an encryption and authentication standard that can be used to build secure Virtual Private Networks (VPNs). It has powerful IPsec policies supporting large and complex VPN networks. It implements both the IKEv1 and IKEv2 (RFC 7296) key exchange protocols.

Wireguard - Fast, Modern, Secure, VPN Tunnel

  •    C

WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances.

OpenVPN - open source SSL VPN solution

  •    C

OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. With OpenVPN, you can tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port, use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization and lot more.

Nightweb - An anonymous P2P social network in Clojure

  •    Clojure

Nightweb is an app for Android devices and PCs that connects you to an anonymous, peer-to-peer social network. It is written in Clojure and uses I2P and BitTorrent on the backend. Please see the website for a general overview, and the protocol page for a more in-depth explanation of how it works.All files that originate from this project are dedicated to the public domain. That particularly includes the files in android/src/clojure/net/nightweb, desktop/src/nightweb_desktop, and common/clojure/nightweb (the Android, desktop, and backend code respectively). All third-party code in this project remains under their original licenses. I would love pull requests, and will assume that any Clojure contributions are also dedicated to the public domain.

constellation - Peer-to-peer encrypted message exchange

  •    Haskell

Hosts a number of NaCl (Curve25519) public/private key pairs. Automatically discovers other nodes on the network after synchronizing with as little as one other host.

peer-tweet - Decentralized feeds using BitTorrent's DHT

  •    Javascript

BitTorrent's DHT is probably one of the most resilient and censorship-resistant networks on the internet. PeerTweet uses this network to allow users to broadcast tweets to anyone who is listening. When you start PeerTweet, it generates a hash @33cwte8iwWn7uhtj9MKCs4q5Ax7B which is similar to your Twitter username (ex. @lmatteis). The difference is that you have entire control over what can be posted because only you own the private key associated with such address. Furthermore, thanks to the DHT, what you post cannot be stopped by any government or institution. Once you find other PeerTweet addresses you trust (and are not spam), you can follow them. This configures your client to store this user's tweets and broadcasts them to the DHT every once in a while to keep their feed alive. This cooperation of following accounts, allows for feeds to stay alive in the DHT network. The PeerTweet protocol also publishes your actions such as I just followed @919c.. or I just liked @9139.. and I just retweeted @5789... This allows the possibility for new users to find other addresses they can trust; if I trust the user @6749.. and they're following @9801.., then perhaps I can mark @9801.. as not spam. This idea of publicly tweeting about your actions also allows for powerful future crawling analysis of this social graph.

Openswan - IPsec implementation for Linux

  •    C

Openswan is an IPsec implementation for Linux. It has support for most of the extensions (RFC + IETF drafts) related to IPsec, including IKEv2, X.509 Digital Certificates, NAT Traversal, and many others. It has been the de-facto Virtual Private Network software for the Linux community since 2005. If you are running Fedora, Red Hat, Ubuntu, Debian (Wheezy), Gentoo, or many others, it is already included in your distribution.

P2P WIKI - collaborative edition

  •    Java

WOOKI is a peer-to-peer wiki. It based on unstructured p2P network with data replication. WOOT framework synchronizes data. SWOOKI is a semantic extenion of WOOKI. It is implemented as a plugin of WOOKI. SWOOKI is peer-to-peer semantic wiki.

setup-ipsec-vpn - Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS

  •    Shell

Set up your own IPsec VPN server in just a few minutes, with both IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS. All you need to do is provide your own VPN credentials, and let the scripts handle the rest. An IPsec VPN encrypts your network traffic, so that nobody between you and the VPN server can eavesdrop on your data as it travels via the Internet. This is especially useful when using unsecured networks, e.g. at coffee shops, airports or hotel rooms.

VyOS - Network Operating System

  •    C

VyOS is an open source network operating system that can be installed on physical hardware or a virtual machine on your own server, or a cloud platform . It is based on GNU/Linux and joins multiple applications such as Quagga, ISC DHCPD, OpenVPN, StrongS/WAN and others under a single management interface.

CARMA VPN

  •    Perl

CARMA VPN is a network management program written in PERL and CGI to assist in the implementation and management of a large fully meshed, fault tollerant, VPN network. The base network platform that CARMA VPN was developed for is Cisco IOS.

G Diffuse Network Servant

  •    VB

A Visual Basic servant for the G Diffuse Network, a decentralized, peer to peer (p2p) network for those interested in, and all things, diffuse.

Entangled

  •    Python

Entangled is a distributed hash table (DHT) and peer-to-peer tuple space, based on Kademlia. It is written in Python, and makes use of the Twisted framework. This can be used as a base for creating peer-to-peer (P2P) network applications.

yavipin

  •    C

Yavipind is a secure tunnel aka 2 peers securely forwardshy;ing packets toward each other.It is what most people calls a VPN (virtual private network). It forwards any kind ofpacket (IPv4, IPv6 or other) sent over the virtual network interface (e.g. t

openvpn-client

  •    Shell

This is an OpenVPN client docker container. It makes routing containers' traffic through OpenVPN easy. OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls.