10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules

10 Internet Safety Rules

Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules

ProtonVPN Is Now the World’s First Fully Open Source VPN App

If you look online for VPN apps you’ll find quite a lot of them all over the place. However, while virtual private networks are mostly used by people looking to remain anonymous on the internet, a lot of VPN apps, particularly free ones, actively undermine that very basic aim by tracking or logging your browsing … Continue reading ProtonVPN Is Now the World’s First Fully Open Source VPN App

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic … Continue reading Tor, Proxychains and VPNs

Tech Terms You Should Know

Bellow are some common tech terms and their meanings. For reference, bookmark this article. More coming soon. 1. Bits and Bytes A bit is a short term of the binary digit where it is the smallest unit of the measurement in computing. As well as, the collection of 8 bits is considered as 1 byte. … Continue reading Tech Terms You Should Know

Privacy Android Apps You Should Install Right Now!

Hey guys, back again, this time with a borrowed post from Techweez. Privacy apps will become essential to you as 2019 approaches especially since multiple data privacy scandals rocked 2018. This year has experienced high profile security breaches and hacks making privacy a security concern for both Android and iOS users. It’s not just about … Continue reading Privacy Android Apps You Should Install Right Now!

Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y'all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know … Continue reading Privacy, Anonymity and Security: The Wonderful Threes Part 1

Using Android as a hacking platform: no root

Hey guys, How are you doing? Today i would like to touch on a topic for white hats, green hats and penetration testing/ethical hacking enthusiasts out there. Hacking and Pentesting using your smartphone. Now before we start I'd like to point out a few things:- First many fail to see the potential of their smartphones, … Continue reading Using Android as a hacking platform: no root