How To Stay Anonymous Online

IF YOU WANT TO BE A HACKER, FOR YOU THATS THE MOST IMPORTANT FOR YOU.
HOW TO STAY HIDE TO TRACKING?
FIRST YOU HAVE NEED TO KNOW THAT TO WHICH THINGS YOU MADE YOURSELF A TRACEABLE PERSON AND MACHINE.



  •  Browser
  • Mail
  • Messinging
  • File transfer
  • Mobile device
  • Operating System
  • Everything which can connect to any network



Browser:-


Tor browser is the best way of secure browsing.
Tor was originally developed for the U.S. Navy with the purpose of protecting government communications. Tor works to help protect your privacy by using a network of virtual tunnels to pass information over the Internet.

     2.Mail:-

Guerrillamail is the best temprary dispoable mailing service.
Guerrilla Mail lets you set up a new, random email address with only a click. Using it in the Tor Browser ensures that no one, not even Guerrilla Mail, can connect your IP address with that ephemeral email address. 

3.Messaging:-


Adium and Pidgin, the most popular Mac and Windows instant messaging clients that support the encryption protocol OTR, also support Tor. 
But the Tor Project  is working to create an IM program specifically designed to be more secure and anonymous. That Tor IM client, based on a program called Instant Bird, was slated for release in March but is behind schedule.

4.File transfer:-

OnionShare is an open source tool that lets you securely and anonymously share a file of any size.





5.Mobile Device:-

Anonymity tools for phones and tablets are far behind the desktop but catching up fast. The Guardian Project created an app called Orbot that runs Tor on Android. Web browsing, email and IM on the phone can all be set to use Orbot’s implementation of Tor as a proxy.
Apple users don’t yet have anything that compares. But a 99-cent app called Onion Browser in the iOS app store offers anonymous web access from iPhones and iPads.


   



6. Oprating system:-


whonix is an a good operating system.
Whonix is an operating system focused on anonymity, security, and privacy. It consists of two parts: One solely runs Tor and acts as a gateway, the other, is on a completely isolated network.




Share on Google Plus

About INDIA

I love hacking, music, photography, travling, close friends and learn someting new. im connected to technology World to since 2006. ©
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment