Twitter Facebook

Category: update

Tails 3.13.1 is out

Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Learn more about Tails. Download and verify.

Read more

Tails 3.0 is out

Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. We are especially proud to present you Tails 3.0, the first version of Tails based on Debian 9 (Stretch). It brings a completely new startup and shutdown experience, a lot of polishing to the desktop,…

Read more

Privacy Browsers

Unlike Chrome, Internet Explorer and Firefox, the following browsers have been designed with privacy in mind, keeping you safe from online tracking. However you must read the warnings your browser gives you and not just click on OK without reading or downloading and installing software from untrusted sources. The Internet browser is a line of defence, but there are many others you must take into consideration to keep your privacy online. Privacy browser for the Internet Midori Browser: Lightweight open source browser originally developed for Linux but now with a Windows and portable version too. Midori comes with privacy extensions by default without you having…

Read more

Free VPN

The following VPN services have a free mode, but remember that somebody has to pay for the bandwidth, hardware and maintenance. One way or another they will get their money, mostly by trying to get you to upgrade limiting what you can do, for example, no video streaming or P2P. Other providers will show advertisements, and one or two could be a scam logging username and passwords. To ward off fraud it is best to stick with VPN companies that have been around for a long time, tell you who they are and how they make their money. Unlimited bandwidth free VPN VPNBook: Free VPN…

Read more

How Tor Users Got Caught – Defcon 22

4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. Part 2 can be found here https://www.youtube.com/watch?v=TQ2bk... You can read more about the cases here: http://se.azinstall.net/2015/11/how-t...Case 0: Harvard bomb threat Eldo Kim getting busted by being one of the only users at Harvard on the tor network, and admitting he emailed the bomb threat.Case 1: Hector Xavier Monsegur (Sabu) and Jeremy Hammond LulzSec getting caught for logging on to IRC one time without tor and FBI using correlation.Case 2: Freedom Hosting admin under attack from Anonymous group previously fighting CP…

Read more