Affichage des articles dont le libellé est tails. Afficher tous les articles
Affichage des articles dont le libellé est tails. Afficher tous les articles

nsa automatically tracks users who search for "tor "


Xkeyscore one of the nsa's  surveillance program's source code was revealed by security experts,as nsa is tracking users automatically who search for tor,as tor helps users to prevent their privacy and anonymity,as the users of tor makes nsa's program(xkeyscore) much difficult to surveillance on the  user.now its seems they found a way to surveillance users ,before they hide themself from the internet,if any user who search for tor or tails in the popular search engines like google ,yahoo their ip address will automatically added to the list for surveillance,this not it,the monitored websites like

  • freeproxies.org
  • hotspot shield
  • privacy.li
  • megaproxy
  • and anonymous email service namely"mixminion".
the identity of users who simply visit the pages is recoreded and saved on the nsa's server,
 “This shows that Tor is working well enough that Tor has become a target for the intelligence services,” said Sebastian Hahn, who runs one of the key Tor servers. “For me this means that I will definitely go ahead with the project.




meet hackers
www.meethackers.com

~ vendredi 4 juillet 2014 0 commentaires

Staying Anonymous

Alright Guys, this is the first post of this blog. But I won't waste time with formalities. But before you become a hacker, you must know how to stay anonymous online. There are various levels in which this can be done
(Note: None of these methods are completely foolproof. If you are doing something illegal, then you'll go to jail. That's it.)

Tails OS

"Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly."
This is what their official website has to say about it. Actually, it is nothing but an OS that comes with all applications customized for privacy and anonymity.
Thats what tails OS looks like.


How To Use
  1. Go to their official website and read the stuff there. 
  2. Download the latest version of the OS.
  3. Put it on a USB and boot.
  4. Explore the OS, and learn more about it from their documentation.
Once you are through with the documentation and have practiced enough with the OS, your identity is safe.


Tips
  1. You should have some experience with linux if you want to become a hacker. Ubuntu is good for beginners.
  2. Do not assume that you are completely anonymous. You are not.

TOR BROWSER BUNDLE

"The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained." - Official Website
If the idea of downloading a whole OS sounds boring to you, then this browser is made for you. It, however, is not as robust as tails, and its usage is limited to anonymous browsing.

    How To Use
    1. Go to their website and read the documentation.
    2. Download the latest browser bundle.
    3. Read the documentation.
    4. Install and run.
    Note:
    Browsing is annoyingly slow, since the traffic passes through three relays.

    That's all for this post. In the next post we'll talk about VPNs.



    ~ samedi 3 août 2013 0 commentaires