Portable Retroshare 0.6.7a

RetroShare: secure communications with friends

RetroShare is a Open Source cross-platform, private and secure decentralised communication platform. It lets you to securely chat and share files with your friends and family, using a web-of-trust to authenticate peers and OpenSSL to encrypt all communication.
RetroShare provides filesharing, chat, messages, forums and channels ...

Author Dr. Bob
License Open Source
Price FREE
Released 2024-01-19
Downloads 377
Filesize 24.70 MB
Requirements
Installation Instal And Uninstall
Keywords share file, peer to peer, P2P client, share, P2P, download, feed
Users' rating
(38 rating)
Portable RetroshareFile Sharing / Peer to PeerWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64, Windows 11
Portable Retroshare end of - Download Notice

Using Portable Retroshare Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Portable Retroshare on rapidshare.com, depositfiles.com, megaupload.com etc. All Portable Retroshare download links are direct Portable Retroshare full download from publisher site or their selected mirrors.
Avoid: end of oem software, old version, warez, serial, torrent, Portable Retroshare keygen, crack.
Consider: Portable Retroshare full version, end of full download, premium download, licensed copy.

Portable Retroshare end of - The Latest User Reviews

Most popular File Sharing / Peer to Peer downloads

FreeNet

0.7.5 Build 1503 download

... connections. Both modes offer robust security features, including end-to-end encryption and data obfuscation, ensuring that user activities remain private and secure. The software is open-source, which means that its ...

Transmission Remote GUI for Mac OS X

5.18.0 download

Transmission Remote GUI is feature rich cross platform front-end to remotely control Transmission daemon via its RPC protocol. It is faster and has more functionality than build-in Transmission web interface. ...

Internxt Drive

2.5.5 download

Internxt Drive is a cutting-edge cloud storage solution developed by Internxt, designed to offer unparalleled security, privacy, and user control. This innovative software is tailored for individuals and businesses that prioritize ...

Sync Breeze Server

5.0.27.0 download

... in the crowded cloud storage market by offering end-to-end encryption, ensuring that your files are safe from unauthorized access at all times. One of Sync's most compelling features is ...

Seafile

9.0.14 download

... features is its robust security measures. It offers end-to-end encryption, ensuring that files are encrypted on the client side before being uploaded to the server. This guarantees that only the ...

get2Clouds

1.0.1.263 download

... the core of get2Clouds. The software employs military-grade end-to-end encryption to ensure that files and messages are protected from unauthorized access. This level of encryption guarantees that only the intended ...

ownCloud

5.3.2.15463 download

... a variety of features to protect user data. End-to-end encryption, two-factor authentication, and comprehensive logging and auditing tools provide peace of mind, while customizable access controls allow administrators to tailor ...

MEGAsync

5.14.0.3 download

... of the standout features of MEGAsync is its end-to-end encryption. Mega Limited has built a reputation for prioritizing user privacy and security, and MEGAsync is no exception. Files are encrypted ...

SopCast

4.2.0 (2016-5-26) download

... player * Memory buffering * Self-help management * End-to-End security * Record p2p stream What does ... The broadcaster has full control on his channels. End-to-End security, encrypted messages, hi level P2P security, no ...

5 award

MUTE File Sharing

0.5.1 download

... Routes in the MUTE network are not encrypted end-to-end. Because of person-in-the-middle attacks during a routed key-exchange, secure end-to-end encryption is impossible in an anonymous network. There ...