Browsing category

Anonymity

Top 4 Linux Operating Systems for Privacy & Anonymity – 2019

With the development of the Internet, personal information is becoming more and more transparent. For preventing the leak information, many security teams are interested in developing your anonymous protection of the operating system. Here are the anonymous based-Linux Operating Systems which you should use. Qubes OS Qubes OS is a security-oriented operating system (OS). The OS […]

How to Fully Anonymize Your System with Tor using Nipe

Nipe is a Script to make Tor Network your Default Gateway. Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by criminals enterprises, Hacktivism groups, and law enforcement agencies at […]

Whonix – An Operating System Focused On Anonymity, Privacy and Security

Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy. Based on Tor, Debian GNU/Linux and the principle of security by isolation, Whonix realistically addresses common attack vectors while maintaining usability Online anonymity and censorship circumvention are attainable via fail-safe, automatic, and desktop-wide use of the […]

iWant – Decentralized Peer to Peer File Sharing

A command-line tool for searching and downloading files in LAN network, without any central server. Features Decentralized : There is no central server hosting files. Therefore, no central point of failure Easy discovery of files: As easy as searching for something in Google. File download from multiple peers: If the seeder fails/leaves the group, leecher will […]

Quiet – Transmit Data Through Sound

This library uses liquid SDR to transmit data through sound. This makes it suitable for sending data across a 3.5mm headphone jack or via speaker and mic. Quiet can build standalone binaries for encoding/decoding data via .wav files or for streaming through your soundcard via PortAudio. It can also be built as a library to […]

How To Use Proxychains To Evade Detection in Kali Linux

The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentester is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. We need more additional tools in order to hide […]

Anonymous Offline Communications System: PirateBox

PirateBox creates offline wireless networks designed for anonymous file sharing, chatting, message boarding, and media streaming. You can think of it as your very own portable offline Internet in a box! When users join the PirateBox wireless network and open a web browser, they are automatically redirected to the PirateBox welcome page. Users can anonymously […]

How To Setup VPN On Kali Linux For Anonymity

Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or government can only see that you have connected to the VPN server and nothing else – your activities, IP addresses you have visited etc. are […]

OnionScan – Tool To Check If Your Onion Site Really Is Anonymous

The purpose of this tool is to make you a better onion service provider. You owe it to yourself and your users to ensure that attackers cannot easily exploit and de-anonymize. Go Dependencies h12.me/socks – For the Tor SOCKS Proxy connection. github.com/xiam/exif – For EXIF data extraction. github.com/mvdan/xurls – For some URL parsing. OS Package […]

Anti-Dox : Removing your information off the web

The Paranoid’s Bible (PB) is a repository of knowledge meant to help people remove their information (Dox) from the web and people search engines. The purpose of this chapter is to provide you with an up-to-date as possible listing of any and all opt-outs. This means you’ll be able to opt-out of not only known […]

How to Delete yourself from the Internet

Have you ever wondered what information web pages have on you? Just perform a simple google search and check out the results! You will get surprised that they even know your dog’s name, some photos you took while very drunk are there as well. Even some stupid videos you took way back in college. And your […]

How to stay anonymous and protect yourself against hackers

A computer is never truly secure , but with the help of tools/software we can make it difficult for today’s hacker. The whole idea behind this is to make it extremely hard to track you down and of course the sake of your privacy. This tutorial is about 2 types of protection. Offline protection Online […]