- Joined
- Jun 20, 2020
The biggest and most useful is Tor by far. Unless your threat model includes state-level actors, it is effectively anonymous. The "best" IMO is I2P. It avoids many concerns the Tor network has and it is a smaller target for the bad guys. However, it will never be used by normies because it doesn't open to the clearnet by default.