Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
TECH & CYBERSECURITY

The Best Password Guide: Updated!

Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take […]

Categories
LIFE TECH & CYBERSECURITY

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Official Tor Browser Launched on The Play Store

First stable version of the Tor browser for Android IS now available on Google Play Store On May 22nd 2019, the Tor Project released the stable version of Tor Browser for Android on Google’s Play Store, which is now available as a free download. For those unaware, Tor is a network technology that preserves users’ […]

Categories
TECH & CYBERSECURITY

Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y’all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know […]

Categories
TECH & CYBERSECURITY

Using Android as a hacking platform: no root

Hey guys, How are you doing? Today i would like to touch on a topic for white hats, green hats and penetration testing/ethical hacking enthusiasts out there. Hacking and Pentesting using your smartphone. Now before we start I’d like to point out a few things:- First many fail to see the potential of their smartphones, […]