Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'anonymous'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. A powerful software with a friendly user interface that allows you to surf anonymously online and enjoy watching free TV and on-demand television when living abroad, traveling, on business or vacation. Protect your privacy and browse anonymously on the internet Many proxy servers available from all over the world Bypass website area restrictions for Google, YouTube, Facebook. Unblock BBC iPlayer, ITV Player, Wilmaa and more... [Hidden Content] [hide][Hidden Content]]
  2. i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client. I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses. I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers). I2P allows people from all around the world to communicate and share information without restrictions. Features Distributed anonymous networking framework End-to-end encrypted communications Small footprint, simple dependencies, fast performance Rich set of APIs for developers of secure applications Supported systems: GNU/Linux (Debian, Ubuntu, etc) - Build on Ubuntu CentOS, Fedora, Mageia - Build Status Alpine, ArchLinux, openSUSE, Gentoo, etc. Windows - Build on Windows Mac OS - Build on OSX Docker image - Build containers Snap - i2pd i2pd FreeBSD - Build on FreeBSD Android - Android CI iOS [Hidden Content]
  3. Whoami is a user-friendly privacy and anonymity tool designed to provide a high level of security through its simple interface and easy-to-use features. The tool uses over 9 modules to ensure maximum anonymity and also comes equipped with a Bug fixer module that is currently under development to solve any potential issues. While the tool offers comprehensive security measures, it is important to note that there is no such thing as 100% security on the internet. To use Whoami, simply complete the setup and then launch the application by searching for "Kali Whoami" in the search menu or by typing "sudo kali-whoami --help" in a terminal. For more detailed information about the tool and its modules, please refer to the website. [Hidden Content] Happy Hunting!
  4. Linux Kodachi operating system is based on Ubuntu 18.04.5 LTS, it will provide you with a secure, anti-forensic, anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + a DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Changelog v8.27 + Kernel upgrade ! System packages update + Openssl + Syncthing + Crypto wallets + Tor browser + Added Pico crypt application + Added new bookmarks on Kodachi browsers + plugins update + Added one new wall paper ! Random hardware id is on by default and status added to conky ! Fixed a bug with ip locator within the Dashboard GUI changed ! Fixed a bug with folder shreding within the Dashboard ! Fixed a bug with BTC balance checker within the Dashboard ! Fixed and repostioned items on conky ! browser.disableResetPrompt was set to true – Demonsaw chat removed EOL [Hidden Content]
  5. A powerful software with a friendly user interface that allows you to surf anonymously online and enjoy watching free TV and on-demand television when living abroad, traveling, on business or vacation. Protect your privacy and browse anonymously on the internet Many proxy servers available from all over the world Bypass website area restrictions for Google, YouTube, Facebook. Unblock BBC iPlayer, ITV Player, Wilmaa and more... [Hidden Content] [hide][Hidden Content]]
  6. Software Details ChrisPC Anonymous Proxy Pro is the privacy tool that anybody would need to use to protect their online experience. Browsing, buying online, watching online TV channels or reading online newspapers are part of our daily life. What is important to know is that when we connect to the Internet we are exposed, our buying/browsing habits and our confidential data are at risk. Of course there are several means and levels of security you can take online, like the ones you have for your home: you have a door lock, you have even a dog barking and you may have also a security system, surveillance system and so on. [hide][Hidden Content]]
  7. Description Would you like to learn everything about the anonymous world the Dark web You are in the Right Place! Brief Description: This course covers how explore the hidden part of the internet(dark web) without break any rules, no matter what professionalism you have , whether you are an IT professional or a personal user. We will go through step by step how to navigate on the dark web . Also we will go over how to explore some dark web market on the darknet we will see how to avoid get scammed on dark web My Promise to You I’ll be here for you in every step. If you have any questions about the course content or anything related to this topic or any other topic, you can always put a question in the course or send me a direct message. and I will be here with you to help. I want to make this the best course about Dark web , deep web and tor browser . So if there is any way I can improve this course, just tell me and I’ll we be happy to hear and I will make it happen. With the 30-day 100% money-back guarantee, there is nothing holding you back from jumping in right now and trying the course out. Go ahead and click the enroll button, and I’ll see you in lesson 1! Who this course is for: Anyone who is Curious and Interested about the Dark Web and Tor Browsers. Requirements you will only need a Computer and an Internet connection. [Hidden Content] [hide][Hidden Content]]
  8. A powerful software with a friendly user interface that allows you to surf anonymously online and enjoy watching free TV and on-demand television when living abroad, traveling, on business or vacation. Protect your privacy and browse anonymously on the internet Many proxy servers available from all over the world Bypass website area restrictions for Google, YouTube, Facebook. Unblock BBC iPlayer, ITV Player, Wilmaa and more... [Hidden Content] [Hidden Content]
  9. 4 Ways To Be Anonymous Online Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online! --------------------------------- 1. Using Proxies A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it. 2. Using Tor Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it 3. SSH Tunneling SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide. 4. Using VPN Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security.
  10. How to stay Anonymous online in 2021: VPN, TOR, WHONIX & TAILS In many applications including surfing the internet, chatting, sending confidential documents anonymity has become a necessary and legitimate desire. A piece of information can be encrypted by using many encryption techniques, but it will only give you the encrypted content and will not hide your identity because It is still possible to know the source and destination of the communicating end. Anonymity in a business network can be devastating as it can make an organization vulnerable to security risks, liability and potential litigation and it is very useful for your competitor to know your moves. Moreover many renowned big companies like Amazon, Microsoft, and Google have collected your personal information in order to serve up targeted ads. There is nothing wrong to be anonymous and controlling your own personal privacy if you are doing the legitimate business. Several ways are present to ensure your privacy while browsing the internet VPN VPN is the acronym for the Virtual Private Network, a technology that allows you to connect to one or more computers by using a private network from public internet connection. Your IP (internet protocol) address is the prime identity number that Internet provider assigns your computer to let you go anywhere on the Internet. It’s exactly like the house number on your home. It masks an IP address so all online activities are virtually untraceable from any one. User’s initial IP address is replaced with one from the Virtual Private Network provider so that a communication take place without being tracked, monitored, and identified. Why VPN is called a network because you’re using a special network of VPN servers that covers the entire globe. How does VPN Work? VPN works in a way to bypass censorship by creating a pathway within a client and server ends with different control points through which data packets travel. When using a VPN an encryption and authentication layer is applied to that pathway in order to protect the traffic and data packets travel. Data packets travel through virtual, private and secure channel. This technique is called VPN Tunneling which creates a secure communication channel within network of computers. How does VPN work Drawbacks of VPN For end-device users, VPN might be an easy set up since you just need to download your VPN application and install it on your device but it has the drawback of being monitored from VPN service providers as they allow you to use their private servers in exchange for your data. There have been cases where VPN service providers are monitoring the data from their users for their own benefits in that way your communication is not all private but be monitored by service providers. What is TOR? The Onion Router (TOR) is a free and open-source software for enabling anonymous communication. It is designed to stop people tracking your browsing habits including government agencies and corporations. The name (The Onion Router) refers to the way that Tor protects your data by wrapping it in multiple layers of encryption like an onion. How does TOR work? TOR Browser routes all web traffic through the TOR network, making it anonymous. As the image below shows, TOR consists of a three-layer proxy, like layers of an onion. At first, TOR Browser connects at random to one of the publicly listed entry guards, bounces that traffic through a randomly selected middle relay, and finally directed the traffic through the third and final exit relay. how does tor work Drawbacks of TOR One of the drawbacks of TOR browser is that your ISP can see that you’re connected to TOR hence it can draw attention to you. Although, your ISP can’t see your activities but it will raise suspicion about what you’re doing. Another drawback of using TOR browser is that it only hides traffic going through TOR network and won’t anonymize other apps on your computer hence not completely giving the concept of anonymity. WHONIX OS Whonix is a Debian based Linux operating system used to provide anonymity, privacy and security on browsing the Internet. It consists of two main components i.e. Whonix workstation and Whonix gateway. Both components are VirtualBox virtual machine appliances, so as to run it on any operating system that has VirtualBox. How Does Whonix Work? At first the Whonix workstation and gateway are configured on host machine. Workstation consists of the desktop application, routes all of its traffic to the gateway which is connected to the workstation. The gateway is further connected to the TOR network for accessing the internet. Whonix gateway is the only way for the workstation to transmit the information through internet because the workstation is an isolated machine and it has no idea about its own host IP and configuration. From the image we can see that all the traffic that is directed through the gateway is TORrified while the traffic from the host machine in non TORified.The host machine does not participate in the Whonix private network and that is why continues to use its normal internet connection. how does whonix work It is a huge advantage of isolating the workstation from a network to keep an IP address private even if any application in a Whonix workstation is compromised, it is almost impossible to reveal your IP because it does not know your IP. Drawbacks of Whonix Although Whonix provides transparency of your IP address, it has a notable disadvantage in terms of physical security. If your host machine is ever compromised, all the stored personal information and your internet browsing activity could be discovered easily. TAILS Linux OS If your goal is to leave no trace of every activity you did on the host machine then choose Tails. Tails or The Amnesic Incognito Live System is a live Debian based linux operating system that aims to provide privacy and anonymity. You can start TailsOS on almost any computer from a USB stick or a DVD. Tails sends its traffic by using TOR network, leaving no trace on the system you are using. Live means it runs on the medium typically a USB, immediately upon starting the system. The entire operating system lives on that USB. All you have to do is first download the live operating system, write it on a USB, insert it to the system, after turning it on you will get a live operating system simply boots from a USB device. tails OS linux The portability of TailsOS solves the problem of physical security as if your USB device ever gets lost or compromised, there will be no personal information present on that USB as well as the system on which you have inserted that USB and nothing can be learned about your specific usage. And The Winner Is? As we have seen there are many techniques and tools available to hide a person’s identity while browsing the internet. The above mentioned techniques provide anonymity at some point and has some notable drawbacks which can lessen the degree of anonymity so by comparing VPN, TOR, WHONIX and TAILS, the technique that is said to be the best practice for providing complete anonymity as well as safe and secure communication is TAILS as it gives you complete security for traffic transmission, privacy of identity and the physical security.
  11. Invisible Internet Protocol: Network without borders We are building network which helps people to communicate and share information without restrictions. i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client. I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses. I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers). I2P allows people from all around the world to communicate and share information without restrictions. Features Distributed anonymous networking framework End-to-end encrypted communications Small footprint, simple dependencies, fast performance Rich set of APIs for developers of secure applications [Hidden Content]
  12. A powerful software with a friendly user interface that allows you to surf anonymously online and enjoy watching free TV and on-demand television when living abroad, traveling, on business or vacation. Protect your privacy and browse anonymously on the internet Many proxy servers available from all over the world Bypass website area restrictions for Google, YouTube, Facebook. Unblock BBC iPlayer, ITV Player, Wilmaa and more... ChrisPC Anonymous Proxy Pro is the privacy tool that anybody would need to use to protect their online experience. Browsing, buying online, watching online TV channels or reading online newspapers are part of our daily life. What is important to know is that when we connect to the Internet we are exposed, our buying/browsing habits and our confidential data are at risk. Of course there are several means and levels of security you can take online, like the ones you have for your home: you have a door lock, you have even a dog barking and you may have also a security system, surveillance system and so on. Every person needs a different level of protection for his/her privacy. Therefore you are in charge with deciding the level of protection you need. You should be aware of this: when connected to the Internet your location and browsing habits are exposed to the accessed websites, because they know your IP/country/city/street that you are accessing from. If you don't mind, that is fine. But if you would like to protect your privacy and have a low profile on the net, you can start with ChrisPC Anonymous Proxy Pro which can help you in several distinct ways. The software offers three running modes : Anonymous Proxy Mode, Expat Internet Browsing Mode and Unblock Websites Mode. [Hidden Content] [hide][Hidden Content]]
  13. ChrisPC Anonymous Proxy Pro is an easy to use proxy changer thats work to protect your online experience by changing your IP address to Anonymous Proxy. ChrisPC Anonymous Proxy can help you escape from the worries of data theft or other important informations by replacing the real IP address with a fake IP address, and it also allows you to access sites blocked by your internet provider. Key features: Access blocked/restricted websites Advanced proxy connection settings Automatically connect to proxy Choose between a Random IP Customize the Unblock Profiles Fast anonymous proxy connection Super safe and very easy to use Protect privacy and browse anonym Surf anonymously, and more. [Hidden Content] [hide][Hidden Content]]
  14. About The Project The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest possible level of anonymity. Finally, don't forget that there is never a hundred percent security on the internet! Features Anti mitm Log killer IP changer Dns changer Mac changer Anti cold boot Timezone changer Hostname changer Browser anonymization [hide][Hidden Content]]
  15. What you'll learn An advanced practical skill-set in how to stay anonymous online, how to maintain privacy and how to bypass firewalls and proxies. After this course, you will have a detailed understanding of how anonymity online might be achieved against various types of adversaries. From corporations to nation-state adversaries. Start a career in cyber security. Become a cyber security specialist. The very latest up-to-date information and methods. You will learn how to apply effective OPSEC or operational security to maintain anonymity online. OPSEC is the actions and behaviors required to maintain security and anonymity. We look at live operating systems, what they are, which are the best ones, and how they can be used for security, privacy, and anonymity. You will gain a complete understanding of how to use virtual private networks (or VPNs) for security, privacy and to attempt anonymity. Everything from choosing a provider to preventing protocol leaks. We fully explore the anonymising service and darknet known as Tor. What are its weaknesses and what you can do to mitigate those weaknesses to improve your anonymity and security when you are using Tor. Including exploring the use of virtual and hardware routers and gateways. You will learn how proxies servers are used for privacy and hiding your IP address. You will understand the difference between the various types of proxies, what they are suitable for, and importantly learn about their many weaknesses. We cover how to use the extremely versatile SSH protocol for optimal security, privacy, and anonymity. Covering local, remote and dynamic port forwarding. Authentication and hardening. You will understand the i2p darknet and how to best use it with optimal configuration to protect your security and anonymity. We look at other privacy and anonymizing services too such as JonDoNym, botnets, and bulletproof hosting services. We cover in detail how censorship can be circumvented by learning how to bypass firewalls, proxies, deep packet inspection technology and nation state censorship. Then we learn the more advanced methods of anonymization by exploring nesting and chaining anonymizing services together. You will understand their strengths, weaknesses and what each chaining method is suitable for. You will understand how to use off-site connections such as Wi-Fi hotspots and Internet cafes for privacy and anonymity. How to use them securely and anonymously even against a well-resourced adversary with global influence. We cover how to use cellular networks for privacy and anonymity. You will understand the inherent weaknesses of cellular networks and how to use them best for privacy and anonymity. For each section, you will learn both the theory and how to step by step setup each method. A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate. Requirements A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn. I recommend you watch volume 1 and 2 of this complete course before watching this volume (3) although it is not required. Most items referenced in this course are free. But you may elect to purchase additional software, hardware, and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course. Please note this is Volume 3 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity. Description Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence. Covering all major platforms including Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others. Become a cyber security specialist. - Go from beginner to expert in this easy to follow advanced course. We cover in detail all the best anonymising and privacy methods. Including; Tor VPNs - Virtual Private Networks Proxy servers - HTTP, HTTPS, SOCKs and Web SSH Secure Shell Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux OPSEC - Operation Security I2P - The Invisible Internet Project JonDoNym Off-site connections - Hotspots and Cafes Mobile, Cell Phones & Cellular Networks Bulletproof hosting and more.... For each of these anonymizing methods we analysis in detail their strengths and weaknesses, we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attacks. Advanced anonymity: We explore chaining and nesting anonymizing services together to provide layers of obfuscation for maximum anonymity against even the most well-resourced adversaries. We cover bypassing censors, firewalls, and proxies. Learn to bypass the trickiest of censoring devices including DPI (deep packet inspection). The course covers both the theory and practically how setup everything we discuss. This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity. Who this course is for: This course is for anyone who wants to become an expert in security, privacy and anonymity. For those who want privacy and anonymity online from hackers, corporations and governments. For beginners and intermediate Internet users who are interested in security, privacy and anonymity. This course is designed for personal and home Internet security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity. [Hidden Content] [hide][Hidden Content]]
  16. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.4 Based on: Xbuntu 18.04.5 LTS Kernel: 5.9.1 System: 64bit Release date: 23.10.2020 Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare Code name: Stable + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23 + Firefox + Signal + Tor browser update + Added new information on panic room system information [hide][Hidden Content]]
  17. How to always open Chrome browser in safe and anonymous mode? ✓Normally, all your web browsing information is saved, including cookies, passwords, and even the URL of the site you visited. * If you don't want this to happen and always browse the web anonymously and this information is not saved + Do the following steps * ShortCut from the Chrome browser on your desktop * Right-click on Chrome shortcuts and tap Properties * Come on the Shortcut tab * Find the target path Go to the end and close a space (Space) and write this phrase incognito- * In this case, every time you open the browser, it is in safe mode.
  18. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.2 + Kernel upgrade from 5.4.0-33 to 5.4.0-42 + Full system update + Added session messenger ( One of the best secure messengers) + Added Steghide-GUI now you can hide your text messages encrypted in jpg or wav ..etc files! + Added pci=noaer to grup options for error prevention + Few icons changes + Threema web added to bookmarks ! Conky improved and refresh timer reduced ! Yandex DNS moved to lower position ! Fixed bandwidth message length issue ! Fixed onions share update issue – Replaced Kodachi browser ip lookup plugin – Replaced Riot with Element [hide][Hidden Content]]
  19. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.1 + Kernel upgrade from 5.0.0-27 to 5.4.0-26 + Added FDN DNS + Added Next DNS + Added Cloudflare Family malware and adult content filtering + Added Neustar Family malware and adult content filtering + Added exfat file system support + Added Enigmail plugin for Thunderbird + Added Tilix + Added USBGuard + Added USBKill + Added proxychains + Concky improved new display items like Torrify ip/country and font size + Added MPV player + Added new options to Ip source control and sys logs scripts – Jaxx wallet remove – Exoduse wallet removed – Xelcore wallet removed – Bisq exchange removed – Tox chat removed – Ring chat removed – VLC removed – Full system update – Removed Tenta and Fourth estate DNS / slow and dead – Kodachi browser changes – DuckDuckGo plugin removed – Disable JavaScript removed – BP Privacy Block All Font and Glyph Detection replaced WITH trace – Canvas Defender replaced WITH trace – Canvas Blocker replaced WITH trace – AudioContext Fingerprint Defender replaced WITH trace – Adnauseam added – uBlock Origin replaced WITH Nano Adblocker – CSS Exfil Protection Added – HTTPZ Added – Privacy Badger and Privacy Possum removed – Added Buster – Discord link added – MYKI plugin added – anonymousspeech link added to mails – ctemplar.com link added to mails – restoreprivacy link added to privacy bucket – Added get.webgl.org to Security check to test WebGl – Added WebGL Fingerprint Defender plugin – Public IP Display replaced with My Public IP plugin – Kodachi settings json added to browser ! Fixed VPN <-> Torrify to VPN -> Torrify on screen score status ! Fixed i2p now is working ! Proton VPN moved to location 5 of VPN lists ! Fixed light browser spelling mistake ! Fixed Bisq wrong place on XFCE menu ! Fixed onion sites not working with Kodachi browser ! All scripts have been changed and improved to work with json ! All settings were moved to a single file json ! Casper,dkms and geoip were updated from latest Ubuntu release with kernal [HIDE][Hidden Content]]
  20. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privac y and anonymity and helps you to: Changelog v7.0 + Kernel upgrade from 5.0.0-27 to 5.4.0-26 + Added FDN DNS + Added Next DNS + Added Cloudflare Family malware and adult content filtering + Added Neustar Family malware and adult content filtering + Added exfat file system support + Added Enigmail plugin for Thunderbird + Added Tilix + Added USBGuard + Added USBKill + Added proxychains + Concky improved new display items like Torrify ip/country and font size + Added MPV player + Added new options to Ip source control and sys logs scripts – Jaxx wallet remove – Exoduse wallet removed – Xelcore wallet removed – Bisq exchange removed – Tox chat removed – Ring chat removed – VLC removed – Full system update – Removed Tenta and Fourth estate DNS / slow and dead – Kodachi browser changes – DuckDuckGo plugin removed – Disable JavaScript removed – BP Privacy Block All Font and Glyph Detection replaced WITH trace – Canvas Defender replaced WITH trace – Canvas Blocker replaced WITH trace – AudioContext Fingerprint Defender replaced WITH trace – Adnauseam added – uBlock Origin replaced WITH Nano Adblocker – CSS Exfil Protection Added – HTTPZ Added – Privacy Badger and Privacy Possum removed – Added Buster – Discord link added – MYKI plugin added – anonymousspeech link added to mails – ctemplar.com link added to mails – restoreprivacy link added to privacy bucket – Added get.webgl.org to Security check to test WebGl – Added WebGL Fingerprint Defender plugin – Public IP Display replaced with My Public IP plugin – Kodachi settings json added to browser ! Fixed VPN <-> Torrify to VPN -> Torrify on screen score status ! Fixed i2p now is working ! Proton VPN moved to location 5 of VPN lists ! Fixed light browser spelling mistake ! Fixed Bisq wrong place on XFCE menu ! Fixed onion sites not working with Kodachi browser ! All scripts have been changed and improved to work with json ! All settings were moved to a single file json ! Casper,dkms and geoip were updated from latest Ubuntu release with kernal [HIDE][Hidden Content]]
  21. Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy. Based on Tor, Debian GNU/Linux and the principle of security by isolation Download : [Hidden Content]
  22. How to become Anonymous using Proxychains and Tor [Hidden Content]
  23. Whonix v15 - Anonymous Operating System 20 hrs ago 8:52 AM | Post sponsored by FaradaySEC | Multiuser Pentest Environment Zion3R Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. After approximately one year of development, the Whonix Project is proud to announce the release of Whonix 15. Whonix 15 is based on the Debian buster (Debian 10) distribution. This means users have access to many new software packages in concert with existing packages, such as a modern branch of GNuPG, and more. Major Changes and New Features port Whonix from Debian stretch to Debian buster 5 kernel hardening 7 Blacklist uncommon network protocols 6 systemd unit sandboxing 5 improve entropy collection through extensive research and installation by default of jitterentropy-rngd 3 research implications of spectre / meltdown / retpoline / L1 Terminal Fault (L1TF) 5 vs Whonix Non-Qubes-Whonix: kloak - Keystroke Anonymization Tool 5 Non-Qubes-Whonix: Whonix Live 3 / Live Mode Indicator / grub-live / grub-default-live 1 Non-Qubes-Whonix: switch desktop environment from KDE to XFCE (poll 2) (other desktop environments 3) Non-Qubes-Whonix: reduced image size using zerofree 2 Whonix VirtualBox: CLI version 2 (Whonix ™ with CLI is a version suited for advanced users – those who want Whonix ™ without a GUI.) Whonix VirtualBox: unified ova downloads 5 Qubes-Whonix: change Qubes-Whonix default applications from KDE-ish to XFCE-ish 5 Qubes-Whonix: simplify installation of VM kernel 2 by installing the same recommended Qubes packages as Qubes Debian packages (source 1 (source 2) Whonix KVM: serial console support 3 update sdwdate time sources 1 List of processed Whonix 15 tickets arm64 / RPi 5 port install by default zulucrypt, qtox, onionshare, keepassxc, firejail new usability wrappers: scurlget 1, curlget, pwchange, upgrade-nonroot 1, apt-get-noninteractive, apt-get-update-plus remove mixmaster, ricochet since dead upstream support for Bisq - The P2P Exchange Network 4 port build script to cowbuilder; build packages in chroot and use mmdebstrap for better security add UsrMerge compatibility [Hidden Content]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.