Twitter Facebook

Category: anonymous

Tails 3.13.1 is out

Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Learn more about Tails. Download and verify.

Read more

How to change your MAC address

Change or Spoof a MAC Address in Windows or OS X Every NIC (Network Interface Card) has a unique MAC address (Media Access Control). This applies to all types of network cards, including Ethernet cards and WiFi cards. The MAC Address is a six-byte number or 12-digit hexadecimal number that is used to uniquely identify a host on a network. An example of a MAC address is 1F-2E-3D-4C-5B-6A and it falls into the Layer 2 networking protocol of the OSI model. In today’s networks, ARP, or Address Resolution Protocol converts a MAC address to a Layer 3 protocol address, such as an IP address. A…

Read more

Tails 3.0 is out

Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. We are especially proud to present you Tails 3.0, the first version of Tails based on Debian 9 (Stretch). It brings a completely new startup and shutdown experience, a lot of polishing to the desktop,…

Read more

Privacy Browsers

Unlike Chrome, Internet Explorer and Firefox, the following browsers have been designed with privacy in mind, keeping you safe from online tracking. However you must read the warnings your browser gives you and not just click on OK without reading or downloading and installing software from untrusted sources. The Internet browser is a line of defence, but there are many others you must take into consideration to keep your privacy online. Privacy browser for the Internet Midori Browser: Lightweight open source browser originally developed for Linux but now with a Windows and portable version too. Midori comes with privacy extensions by default without you having…

Read more

Free VPN

The following VPN services have a free mode, but remember that somebody has to pay for the bandwidth, hardware and maintenance. One way or another they will get their money, mostly by trying to get you to upgrade limiting what you can do, for example, no video streaming or P2P. Other providers will show advertisements, and one or two could be a scam logging username and passwords. To ward off fraud it is best to stick with VPN companies that have been around for a long time, tell you who they are and how they make their money. Unlimited bandwidth free VPN VPNBook: Free VPN…

Read more

Anonymous OS list

The following operating systems have been designed to help you being anonymous on the Internet, they come with Tor, encryption and lots of countermeasures that stop online tracking.Anonymous Linux OSSubGraph OS: Desktop communications operating system designed to withstand malware attacks, key applications run inside a sandbox to reduce impact of successful exploits. This operating system has a hardened Linux Kernel and built-in Tor integration with a default policy that filters communication programs through Tor. Email is secured with PGP and SubGraph OS Instant Messenger is CoyIM, a new XMPP compatible messenger sandboxed and connected with Tor by default.Mofo Linux: Ubuntu based operating system optimized to defeat censorship…

Read more

How Tor Users Got Caught – Defcon 22

4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. Part 2 can be found here https://www.youtube.com/watch?v=TQ2bk... You can read more about the cases here: http://se.azinstall.net/2015/11/how-t...Case 0: Harvard bomb threat Eldo Kim getting busted by being one of the only users at Harvard on the tor network, and admitting he emailed the bomb threat.Case 1: Hector Xavier Monsegur (Sabu) and Jeremy Hammond LulzSec getting caught for logging on to IRC one time without tor and FBI using correlation.Case 2: Freedom Hosting admin under attack from Anonymous group previously fighting CP…

Read more

Anonymous email service

The first question to answer here is why go for anonymous email when there are plenty of premium featured and free email services such as Gmail, Outlook and Yahoo! Mail available? Well, privacy and anonymity is a digital right — our digital right. But when you go to a service online and its first three choices for signup are to use existing Google, Facebook, or Twitter account credentials, it's almost like a subtle background check. Other services—like Google—expect you to share a phone number or an older email address to sign up, so you're not exactly hiding your tracks.What do you do if you want…

Read more

TheHiddenWiki (non Deep Web Version 2017 June)

This is None-deep web edition, if you want to visit this site directly , please remove the .to part from url and past it to deepweb browser like Tor or use our Deep Web Version hereLast Updated: 01st of May, 2017Editor's picksBored? Pick a random page from the article index and replace one of these slots with it. The Matrix - Very nice to read.How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off.Verifying PGP signatures - A short and simple how-to guide.In Praise Of Hawala - Anonymous informal value transfer system.Terrific Strategies To Apply A Social media Marketing Approach - Great tips for the internet marketer.VolunteerHere are six…

Read more

TheHiddenWiki (Deep Web Version 2017 June)

The Hidden Wiki , Deep web VersionLast Updated: 01st of May, 2017Editor's picksBored? Pick a random page from the article index and replace one of these slots with it. The Matrix - Very nice to read.How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off.Verifying PGP signatures - A short and simple how-to guide.In Praise Of Hawala - Anonymous informal value transfer system.Terrific Strategies To Apply A Social media Marketing Approach - Great tips for the internet marketer.VolunteerHere are six different things that you can help us out with. Plunder other hidden service lists for links and place them here!File the SnapBBSIndex links wherever they go.Set external…

Read more