
1337 }{4xx0r
Software used for 'hacking', privacy, etc.
The Amnesic Incognito Live System (Tails) is a Debian 9 based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.
Priorities for the next years:
ADOPTION Improve installation instructions Give some love: Fix unsupported Wi-Fi cards. Explain better what Tails is and what makes it so awesome. Tails for blind users
RESISTANCE TO REMOTE EXPLOITATIONS: HTTPS only mirrors for protection Critical parts of Tails audited
COMMUNITY GROWTH, DIVERSITY, AND INCLUSION Create outreach especially to under-represented Recruit new workers and Lower technical requirements for them so we can get more people involved
APPLICATIONS AND FEATURES Screen locker. [DONE] Tails Server: run onion services fron tails! :-) Support GUI's to mount VeraCrypt volumes GUI for the Additional Packages persistent feature: Easily add software to Tails. Mobile msg applications: investigate if we could support Signal, Firechat etc. Provide a GUI for backups
SUSTAINABILITY OF CORE CODE Basing Tails on rolling snapshots of Debian Priority for core code than polishes Port complex shells to Python Robust GMT time snyc
USER RESEARCH Perform surveys. Find more people to describe our users Power our help desk with a tracker
FUNDING FROM PRIVATE PARTNERS Strenghten our relationships with existing ones. Contact more potential ones. Document better benefits for partners
INFRASTRUCTURE MIGRATIONS Update our infrastructure to: Have a better server infrastructure to handle our growing Self-host our website as boum.org won't be hosting anymore
ROBUST AUTOMATED TESTS Local Git repos Our own email server Notify devs on failure
OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. Starting with the fundamental premise that complexity is the enemy of security, OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.
Known as "the world's most resilient BitTorrent site", The Pirate Bay is a website that lets you search for, download, and upload torrents. Download music, movies, games, software and much more.
1337x is a website that provides a directory of torrent files and magnet links used for peer-to-peer file sharing through the BitTorrent protocol. According to the TorrentFreak news blog, 1337x is the third most popular torrent website as of 2021.
History
1337x was founded in 2007 and saw increasing popularity in 2016 after the closure of KickassTorrents. In October 2016, it introduced a website redesign with new functionalities. The site is banned from Google search queries and does not appear when searching through Google search. This action was taken following a request by Feelgood Entertainment in 2015. In 2015 the site moved from its older .pl domain to .to, partly in order to evade the block.
1337x's design can be compared to the now defunct h33t. It has been touted as an alternative to the Pirate Bay in face of its potential demise.
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
WikiLeaks is a website that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Its aim is to reveal unethical behaviour in their governments and institutions.
Deluge is a full-featured BitTorrent client for Linux, Unix and Windows. It is written in python, uses libtorrent (rasterbar) at its core and GTK for the main user interface along with web and console interfaces for advanced client/server facility.
Deluge features a rich plugin collection; in fact, most of Deluge's functionality is available in the form of plugins.
Deluge was created with the intention of being lightweight and unobtrusive. It is our belief that downloading shouldn't be the primary task on your computer and therefore shouldn't monopolize system resources.
Deluge will work just fine across many desktop environments such as GNOME, KDE, XFCE and others.
µTorrent is a lightweight BitTorrent client that includes standard features such as bandwidth prioritization, scheduling, RSS auto-downloading and Mainline DHT. Additionally, µTorrent supports the Protocol Encryption joint specification and peer exchange.
Only the server version is available for Linux officially. The desktop version can run on Linux using Wine.
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community. The Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best seller in security books for 12 months since its release, “Metasploit: The Penetrations Tester’s Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni.
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however none does either support more than one protocol to attack or support parallized connects. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
GNU Wget is a free software package for retrieving files using HTTP(S) and FTP, the most widely-used Internet protocols. It is a non-interactive command line tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc.
A low-cost, capable little PC which can be used for many of the things that your desktop PC does, like games, spreadsheets and word-processing. It also plays high-definition video. We want to see it being used by children and young people all over the world to learn programming.
Bitbucket is a code hosting site, for the Git version control system. It provides a fully featured environment for managing development, including a wiki, a powerful issue tracker, and easy collaboration with others.
GitHub is a web-based hosting service for projects that use the Git revision control system. It is written in Ruby on Rails by Logical Awesome developers Chris Wanstrath, PJ Hyett, and Tom Preston-Werner. GitHub offers both commercial plans and free accounts for open source projects.
The site provides social networking functionality like feeds, followers and the network graph to display how developers work on their versions of a repository.
GitHub also operates a pastebin-style site at gist.github.com, wikis for the individual repositories and web pages that can be edited through a git repository.
GitHub has a built-in, highly functional Issue Tracker.
Bitcoin is a peer-to-peer digital currency. Peer-to-peer (P2P) means that there is no central authority to issue new money or keep track of transactions. Instead, these tasks are managed collectively by the nodes of the network. Bitcoins can be sent easily through the Internet, without having to trust middlemen. Transactions are designed to be computationally prohibitive to reverse. Be safe from instability caused by fractional reserve banking and central banks. The limited inflation of the Bitcoin system’s money supply is distributed evenly (by CPU power) throughout the network, not monopolized by banks.
WiGLE (Wireless Geographic Logging Engine)
We consolidate location and information of wireless networks world-wide to a central database, and have user-friendly java (JiGLE), windows (DiGLE), MacOSX (TinGLE) and web applications that can map, query and update the database via the web API.
We currently accept files in any of NetStumbler and MiniStumbler?'s exported and native NS1 file formats, DStumbler's text output, Kismet's CWGD, XML, CSV, or GPS formats, Pocket Warrior output, MacStumbler 0.75b or later plist and wiscan output, KisMAC 0.6b or later wiscan output, and more via our online form.
To have your record removed from our database, or if you have any questions or suggestions, send an email to: WiGLE-admin(at)WiGLE.net. we also hang out on irc at #wigle on wigle.net:6667
If you encounter a stumbling tool or file format that is not being reported correctly either by the clients or the website, please let the tireless monkies at WiGLE-admin(at)WiGLE.net know, so they can fix/support it.
Browse through over 150 billion web pages archived from 1996 to a few months ago.
The Internet Archive is a non-profit online-application that was founded to build an Internet library. Its purposes include offering permanent access for researchers, historians, scholars, people with disabilities, and the general public to historical collections that exist in digital format. The Internet Archive includes texts, audio, moving images, and software as well as archived web pages in our collections, and provides specialized services for adaptive reading and information access for the blind and other persons with disabilities.
Use the Chrome and the Firefox extension to automatically replace 404 error pages with archived versions of websites.
OpenSSH is a free version of the SSH connectivity tools that technical users rely on. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.
Hyper™ is a beautiful and extensible, cross-platform terminal built on open web standards. It provides an elegant command-line experience that is consistent across all supported platforms which includes macOS, Windows and various Linux distributions like Fedora and Debian.
For developers, extensions are universal Node.js modules loaded by both Electron and the renderer process.
VNC is remote access and control software which allows you to view and fully interact with one computer desktop (the "VNC Connect") using a simple program (the "VNC viewer") on another computer desktop or mobile device anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows desktop at the office on a Linux or Mac computer at home.
WifiKill is an Android app that was first introduced in 2011 by developer "bponury". The app was designed to allow users to monitor and control their WiFi networks, enabling them to see which devices were connected and to disconnect any unwanted devices.
Searx is a free internet metasearch engine which aggregates results from more than 70 search services. Users are neither tracked nor profiled. Additionally, searx can be used over Tor for online anonymity.
Why use Searx?
- Searx may not offer you as personalised results as Google, but it doesn't generate a profile about you
- Searx doesn't care about what you search for, never shares anything with a third party, and it can't be used to compromise you
- Searx is free software, the code is 100% open and you can help to make it better. See more on GitHub
If you do care about privacy, want to be a conscious user, or otherwise believe in digital freedom, make Searx your default search engine or run it on your own server
Technical details - How does it work?
Searx is a metasearch engine, inspired by the seeks project. It provides basic privacy by mixing your queries with searches on other platforms without storing search data. Queries are made using a POST request on every browser (except chrome*). Therefore they show up in neither our logs, nor your URL history. In case of Chrome* users there is an exception, Searx uses the search bar to perform GET requests. Searx can be added to your browser's search bar; moreover, it can be set as the default search engine.
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2.
Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD.
Virtualbox is available in 28 languages.
FileZilla is a powerful FTP-client. It has been designed for ease of use and with support for as many features as possible, while still being fast and reliable. The program offers support for firewalls and proxy connections as well as SSL and Kerberos GSS security.
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, originally forked from Backtrack Linux by the Offensive Security team.
Kali Linux is preinstalled with numerous penetration-testing programs, including Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs). Users may run Kali Linux from a hard disk, live CD, or live USB. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.
Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set, as well as an image for the ARM architecture for use on the Raspberry Pi computer and on Samsung's ARM Chromebook.
Arch Linux is an independently developed, x86_64 optimized GNU/Linux distribution targeted at competent Linux users. It uses pacman, its home-grown package manager, to provide updates to the latest software applications with full dependency tracking. Operating on a rolling release system, Arch can be installed from a CD image or via an FTP server. The default install provides a solid base that enables users to create a custom installation. In addition, the Arch Build System (ABS) provides a way to easily build new packages, modify the configuration of stock packages, and share these packages with other users via the Arch Linux user repository.
The Linux kernel is the operating system kernel used by the Linux family of Unix-like operating systems.
Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence. IT professionals can demonstrate the impact of vulnerabilities to IT operations to obtain buy-in for remediation.
Fing is trusted by over 100 million users worldwide as the #1 network scanner. Discover all the devices connected to your Wi-Fi and identify them, monitor your ISP’s performances, set automated security checks, and find router vulnerabilities in just a few clicks.
With Fing you can:
- Discover all the devices connected to your home network and identify bandwidth stealers.
- Link every device with a user profile to quickly know who’s at home and when
- Get accurate device recognition with plenty of details (IP address, MAC address, device name, model, vendor, and manufacturer)
- Discover hidden cameras connected to your same Wi-Fi network
- Schedule automated speed tests and generate detailed reports about ISP performances
- Run router vulnerability tests
- Analyse advanced settings such as NetBIOS, UPnP, SNMP, SMB, Bonjour names, properties, and device types
- Scan ports, device ping, traceroute, and DNS lookup
- Browse internet outages in your area, ISP ratings, reviews, and speed statistics
Fing is free to download and comes with no ads. It is available for both PCs (Windows and macOS) and mobile (Android and iOS). By pairing the mobile and the PC app you will get full-time monitoring and more accurate results, always available to browse, even on the go.
If you are looking for extended monitoring and network protection for your devices, you can upgrade to Fing Premium to have access to more features:
- Automated network monitoring every 5 minutes
- Automated router vulnerability checks
- Unlimited network troubleshooting tools
- Advanced security checks
- Email and mobile notifications for unknown devices
- Full network timeline
The most complete and advanced IT security professional toolkit on Android.
- enumerate local hostsdone
- find vulnerabilitiesdone
- find exploits for these vulnerabilitiesdone
- use those exploits to gain access to the targetdone
- crack wifi passwords
- install backdoors for later access
- Portability: It can run on any UNIX-based system, but for now only Android is supported.
Shodan is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.
Magisk is the Universal Systemless Interface, to create an altered mask of the system without changing the system itself.
Features
- 100% fully open source and easy to build!
- Magic Mount: Allow you to do any system (vendor) modification without actually tampering the partitions. Anything can be loaded with Magisk systemless-ly!
- MagiskSU: Open Source Root Solution Root your device with MagiskSU, based on phh's Superuser, which is based on CM Superuser.
- Magisk Manager: MagiskSU Root Management, Upgrade Magisk, Manage MagiskHide lists Manage, Upgrade, Download, Install Magisk Modules from the community driven online Magisk Module Repo.
- MagiskHide: Hide Magisk from detections: Google SafetyNet, enterprise / bank system integrity checks, game tamper checks etc.
- Resetprop: Allow you to do any modifications to system properties, including read-only props. This is also used along with magiskhide to trick various device status sent from the bootloader
- Miscellaneous: (Optional) Remove AVB 2.0, dm-verity, forceencrypt. Unlock partitions blocks to support remount to rw
App Cloner is a specialized tool that lets you create and install copies of your existing Android apps so you can do things like utilize multiple logins at various apps such as Facebook and Skype.
KDE Connect is a project that aims to communicate all your devices. For example, with KDE Connect you can receive your phone notifications on your computer, or just use your phone as a remote control for your desktop. To achieve this, KDE Connect implements a secure communication protocol over the network, and allows any developer to create plugins on top of it. Currently there are KDE Connect clients on KDE, Android and Blackberry, and soon we will support iPhone as well.
DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks.
DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection.
The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE).
Atom is an open-source, Electron based text editor with a massive ecosystem of plugins and themes that are easily accessible through a built-in package manager. Being built with Electron, it uses web technology (HTML, CSS, JavaScript and Node.js) and offers the same editing experience across Mac, Windows and Linux desktops. Different from most editors, it uses that same technology for themes so the UI is highly configurable through HTML, CSS and JavaScript.
FEATURES
- Same familiar workflow across platforms.
- Built-in package manager.
- File system browser.
- Advanced find-and-replace that works across multiple files and folders.
- Smart autocompletion.
Vim ("Vi IMproved") is an advanced text editor that allows syntax highlighting, word completion and has a huge amount of contributed content.
Vim offers several “modes” for editing with efficiency. This makes vim a non-user-friendly application but it is also a strength. The normal mode binds alphanumeric keys to task-oriented commands. The visual mode highlights text. The command-line mode offers more tools (for search&replace, defining functions, etc.)
Vim comes with complete help.
Guerrilla Mail gives you a disposable email address. You can give your email address to whomever you don't trust.
You can read the email using Guerrilla Mail, click on any confirmation link, and even reply. Any future spam sent to the disposable email will be zapped, never reaching your mail box, keeping your mail box safe and clean.
Features:
- New email notifications pushed to your device
- No registration, no login, any email address is always ready for use
- Emails permanently deleted after 1 hour
- Alias address toggle (use an alias address for better privacy)
- Inbox ID history
- Download and view attachments
- Sending Email: Attach images, sent box, sending success report, save draft
- No Ads, No Tracking.
Secure email with absolutely no compromises, brought to you by MIT and CERN scientists.
Swiss Based ProtonMail is incorporated in Switzerland and our servers are located in Switzerland. We are outside of US and EU jurisdiction and all user data is protected by strict Swiss privacy laws.
Zero Access Because of our end-to-end encryption, your data is already encrypted by the time it reaches our servers. We have no access to your messages, and since we cannot decrypt them, we cannot share them with third parties.
Backwards Compatible ProtonMail works out of any modern web browser, there is nothing to install. We are also backwards compatible with other email providers so you can continue sending and receiving emails from friends who are not using ProtonMail.
Forever Free We believe privacy is a fundamental human right and should be available for everyone. That's why we offer multi-tiered pricing including a free version that anyone can use. Let's bring privacy back to the people!
Fully Anonymous We do not log IP addresses or require any personal information to sign up. We accept bitcoin and cash payments for paid accounts to ensure even paid account users have complete privacy.
Cross Platform ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser.
Firefox Developer Edition brings you latest features, fast performance, and the development tools you need to build for the open web. Its powerful development tools will extend your ability to work across multiple platforms from one place.
Firefox DevTools features:
- Master CSS Grid
- Page Inspector
- Web Console
- JavaScript Debugger
- Network Monitor
- Storage Panel
- Responsive Design View
- Visual Editing
- Shapes Editor
- Web Audio Editor
- CSS stylesheets Editor
- Scratchpad
- Performance Tools
- Memory Tools
DuckDuckGo is an alternative search engine that has rich features, respects your privacy, and is built from free/open-source software.
• Zero-click Info - Useful information above the links. • More Privacy - We do not track you. • Goodies - Instant answers, !bangs & settings. • Less Spam - We remove sites with just ads.
Element is a Matrix-based end-to-end encrypted (E2EE) secure collaboration and messaging app.
It provides instant messaging, voice and video calls, screen sharing and file sharing; for 1:1s to huge chat rooms. It’s available to use across Web, Android, iOS, macOS, Windows & Linux.
Its decentralised design delivers digital sovereignty, enabling deployment on-premise or through any cloud provider.
Element Matrix Services (EMS) is the most popular SaaS for corporate use of Element. EMS provides fast performance and enterprise-grade add-ons.
Being Matrix-based, Element provides interoperability between traditional siloed apps. It can bridge into proprietary ‘walled garden’ systems such as Slack, Microsoft Teams, WhatsApp, Signal, Telegram and Discord to enable easy connections between different organisations.
End-to-end encryption is provided by default to keep users’ conversations and files safe. Cross-signed device verification uses QR codes or emoji comparisons to guard against imposters and eavesdropping.
Element is built on the Matrix.org open standard which provides bridges to other systems such as Slack, IRC and a lot more soon.
The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as BadUSB MITM attacks – and is built upon the sturdy shoulders of the Kali Linux distribution and toolsets. Whether you have a Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10 or OnePlus One we’ve got you covered.
Using Signal, you can communicate instantly with your relatives without making a compromise on privacy or security. Make video calls, send messages, pictures, videos, documents, voice recordings, GIFs, contacts & location, create groups so that you can chat in real time with all your friends at once and react to their messages with emojis -all with complete privacy-. Signal servers never have access to any of your communications and never store any of your data.
- Say Anything - Share text, voice messages, photos, videos, GIFs and files for free. Signal uses your phone's data connection so you can avoid SMS (No longer supports SMS or MMS) and MMS fees.
- Speak Freely - Make crystal-clear voice and video calls to people who live across town, or across the ocean, with no long-distance charges.
- Make Privacy Stick - Add a new layer of expression to your conversations with encrypted stickers. You can also create and share your own sticker packs.
- Get Together with Groups - Group chats make it easy to stay connected to your family, friends, and coworkers.
- No ads. No trackers. No kidding. - There are no ads, no affiliate marketers, and no creepy tracking in Signal. So focus on sharing the moments that matter with the people who matter to you.
- Remain Connected - Push notifications let you know when new messages have arrived, and they'll be waiting for you even if your battery dies or you temporarily lose service.
- View Source - All of our code is free, open, and available on GitHub (https://github.com/signalapp).
- Join Movements - Technology developed by Open Whisper Systems is trusted and used by millions of people around the world every day.
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Comments
Great list. Thanks for compiling.
I always enjoy seeing software I wasn't already familiar with;
In addition to the many programs you listed: I also find the following very useful at times: Popcorn Time - great for movies.. (all movies, especially new releases). Truecrypt/Veracrypt - excellent file/drive encryption tools. Lastpass - password management. Private Internet Access - best paid - VPN. KeyScrambler - anti keylogger. Bitnami - pre-built virtual machine platforms.
uTorrent isn't good for privacy since it's closed source and propriatery, use qBittorrent, Deluge or Transmission (Tribler is also good but it's experimental)
you shouldn't be using uTorrent anyway its basically a virus. it can download programs without asking and they've also distributed adware and bitcoin miners in the past lol
Agree with OR3O, µTorrent is a terribly dodgy piece of software. qBittorrent is the closest interface. Deluge and Transmission are ported from Linux (I know Transmission was), they're both good.
spectrumsss, is Tribler still in beta? It's been that way for years. I honestly didn't know it was still developed...
It's out of beta, however on their website, they claim "Our anonymity is not yet mature" and it doesn't seem like that will change soon. I wouldn't really recommend it if you're downloading something illegal. If you must use it, use it either with a Tails OS live ISO or with a Whonix virtual machine.
It's out of beta, however on their website, they claim "Our anonymity is not yet mature" and it doesn't seem like that will change soon. I wouldn't really recommend it if you're downloading something illegal. If you must use it, use it either with a Tails OS live ISO or with a Whonix virtual machine.
It's out of beta, however on their website, they claim "Our anonymity is not yet mature" and it doesn't seem like that will change soon. I wouldn't really recommend it if you're downloading something illegal. If you must use it, use it either with a Tails OS live ISO or with a Whonix virtual machine.
Owncloud, nextcloud - to save and edit documents on server ZeroNet - P2Pchat / forums / social network [Edited by mcl12345, May 06]