corridor
jira-cachecar
Our great sponsors
corridor | jira-cachecar | |
---|---|---|
1 | 1 | |
8 | 0 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | over 3 years ago | |
Shell | Shell | |
ISC License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
corridor
-
Host a Matrix chat server over Tor
Yes, I think you could be fairly confident that approach won't leak your IP address. You could probably prevent the software from being able to access your real IP address or make non-tor network requests without dedicating a full VM, by using things like network namespaces and/or a filtering gateway, but that'd be a bit more DIY
jira-cachecar
-
Jira and the Content Delivery Network - thejiraguy.com
You can also just mess with headers and have caching done in a many ways: https://github.com/Bonn93/jira-cachecar
What are some alternatives?
tor-router - A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase privacy/anonymity without extra unnecessary code.
ssl-proxy - :lock: Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)
sirubo - Blocks big tech conglomerate outbound network traffic
nginx-autoinstall - Compile NGINX from source with custom modules and patches on Debian and Ubuntu
HiddenVM - HiddenVM — Use any desktop OS without leaving a trace.
haproxy - HAProxy Load Balancer's development branch (mirror of git.haproxy.org)
Synapse - Synapse: Matrix homeserver written in Python/Twisted.
multitor - Create multiple TOR instances with a load-balancing.