10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules

10 Internet Safety Rules

Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic … Continue reading Tor, Proxychains and VPNs

Change These Default Privacy Settings Now! Facebook, Twitter, Google, Microsoft, Apple, LinkedIn, Yahoo and Amazon

From 2018 to the past few months of 2019, our personal data from social media sites and other tech giants has been hacked, scandalized and or abused breaching our privacy. It is now high time we go through the default privacy settings of most of these sites. In this guide, we’ll try and simplify the … Continue reading Change These Default Privacy Settings Now! Facebook, Twitter, Google, Microsoft, Apple, LinkedIn, Yahoo and Amazon