Home Anonymity Tools

Anonymity Tools

VPN – The Must Have Anonymity Tool

What is a VPN? Virtual Private Network, or VPN for short, is a secure network connection through which you can safely connect your device to public networks. It is widely used by large corporations, educational institutions and government agencies. It is also used by individuals who care about staying anonymous on the...
Anonymous Email

Anonymous Email

Anonymous Email One of the newest trends of the 21st century’s hi-tech world is definitely sending an anonymous email. Whether for the purpose of discovering your cheating spouse, expressing your political attitudes, reporting frauds, informing the authorities about some illegal activities, or reporting some sensitive information to the media; the point...

How To Guide – PGP Encryption To Encrypt Your Communications

The latest Hilary Clinton ‘mishap’ with emails reminds us once again (and in a big way) why it is important to have our emails encrypted. When you know that our online actions are constantly being monitored by the government, it sounds like a good idea to at least try...

Password Managers

So, you are not one of those paranoid characters one meets online on a daily basis. You have no reason to be paranoid - you’re not engaged in anything illegal. So, what’s with all the “You simply MUST have a password manager” preaching?! It’s all a bit blown up, right?

Tape – Sticky Tape/Scotch Tape

In the recent days of cyber surveillance, people’s privacy is becoming less and less of concern under the pretense of increased safety and anti-terrorism and deep web security is taking a huge hit for it. This has come to the point where law enforcement agencies have started to utilize the...

How to make Windows as private as possible

Introduction and Disclaimer Before we dive into the subject, I believe that a little disclaimer is necessary to make sure that everybody reading is at least a bit aware of what they are doing. To clarify, any iteration of Windows released for commercial use is not made with user privacy...

DNS Leak Protection

What is DNS? Before we get into any explanation regarding what a DNS Leak is and how you can protect yourself from one, it is important to clarify what DNS is. DNS essentially is one of the many protocols that the Internet is built upon, much like HTTP or FTP. It represents...

Anonymous Email

One of the newest trends of the 21st century’s hi-tech world is definitely sending an anonymous email. Whether for the purpose of discovering your cheating spouse, expressing your political attitudes, reporting frauds, informing the authorities about some illegal activities, or reporting some sensitive information to the media; the point is...

Virtual Machines

What Is a Virtual Machine? A virtual machine is a program which creates a virtual computer system along with its virtual hardware devices. This means that a separate operating system is running in a window on the desktop of your computer. You can install and run it by booting the installer disc...

VPN – The Must Have Anonymity Tool

What is a VPN? Virtual Private Network, or VPN for short, is a secure network connection through which you can safely connect your device to public networks. It is widely used by large corporations, educational institutions and government agencies. It is also used by individuals who care about staying anonymous on the...

PGP Guide

PGP (Pretty Good Privacy) PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone who might need it. The first version of PGP was developed by Phil Zimmermann in 1991. Since then and since its simple symmetric key algorithm, PGP has...
Tails Logo

Tails Guide

Intro Tails a Linux based operating system aimed to provide anonymity and security to its users. Unlike standard operating systems like Windows or Linux, it does not require to be installed on the machine; instead, it is launched from a LiveUSB stick, DVD or SD card. It also doesn’t require many...

Tor Guide

If you want to browse through a vast sea of unindexed internet, aka the Deep Web, you will have to use something called Tor, otherwise you won’t be able to access the Deep Web. So, what is Tor and why do I need it? Tor stands for The Onion Router. You’ll...