(Note: None of these methods are completely foolproof. If you are doing something illegal, then you'll go to jail. That's it.)
Tails OS
"Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly."
This is what their official website has to say about it. Actually, it is nothing but an OS that comes with all applications customized for privacy and anonymity.
Thats what tails OS looks like. |
How To Use
- Go to their official website and read the stuff there.
- Download the latest version of the OS.
- Put it on a USB and boot.
- Explore the OS, and learn more about it from their documentation.
Once you are through with the documentation and have practiced enough with the OS, your identity is safe.
Tips
- You should have some experience with linux if you want to become a hacker. Ubuntu is good for beginners.
- Do not assume that you are completely anonymous. You are not.
TOR BROWSER BUNDLE
"The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained." - Official Website
If the idea of downloading a whole OS sounds boring to you, then this browser is made for you. It, however, is not as robust as tails, and its usage is limited to anonymous browsing.
How To Use
- Go to their website and read the documentation.
- Download the latest browser bundle.
- Read the documentation.
- Install and run.
Note:
Browsing is annoyingly slow, since the traffic passes through three relays.
That's all for this post. In the next post we'll talk about VPNs.
No comments:
Post a Comment