(Note: None of these methods are completely foolproof. If you are doing something illegal, then you'll go to jail. That's it.)
Tails OS
"Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly."
This is what their official website has to say about it. Actually, it is nothing but an OS that comes with all applications customized for privacy and anonymity.
How To Use
- Go to their official website and read the stuff there.
- Download the latest version of the OS.
- Put it on a USB and boot.
- Explore the OS, and learn more about it from their documentation.
Once you are through with the documentation and have practiced enough with the OS, your identity is safe.
Tips
- You should have some experience with linux if you want to become a hacker. Ubuntu is good for beginners.
- Do not assume that you are completely anonymous. You are not.
TOR BROWSER BUNDLE
"The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained." - Official Website
If the idea of downloading a whole OS sounds boring to you, then this browser is made for you. It, however, is not as robust as tails, and its usage is limited to anonymous browsing.
How To Use
- Go to their website and read the documentation.
- Download the latest browser bundle.
- Read the documentation.
- Install and run.
Note:
Browsing is annoyingly slow, since the traffic passes through three relays.
What is better proxy server or vpn ??
ReplyDeleteYou can searched "proxy service" or "vpn service" by google...
Deleteproxy
ReplyDeleteCYber Ghost
DeleteI find something that should be fairly obvious is DON"T LEAVE YOUR NAME ON SHIT THAT IS PRIVATE
ReplyDeleteBahaha
ReplyDeleteYou will be surprised at how easily information about you is obtained from the internet! Even if your system does not contain any viruses or malicious software, information such as your IP address, location. Anonymous News
ReplyDeleteWith a help of PIA VPN https://fivebestvpn.com/review/private-internet-access/ you will always stay anonymous and safe!
ReplyDelete