Jump to content

Search the Community

Showing results for tags 'anonymity'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 8 results

  1. LAS VEGAS — Ask any hacker who’s been around long enough, and there’s a good chance you’ll hear an archetypal story, tinged with regret, about the first time his or her real identity was publicly disclosed. After enjoying years of online anonymity, the hacker known as Grifter was unmasked by a less-than-scrupulous spouse. “Hey, Neil!” his wife called out at him, absent-mindedly, from across a crowded room, while accompanying him (for the very first time) at a hacking conference. “My beautiful wife, she outed me in front of the entir
  2. New policy will require users to provide identity information to use any blockchain service After killing all legitimate cryptocurrency businesses in the country, Chinese authorities are now turning their attention to other blockchain service providers. The country’s apex internet regulator, Cyberspace Administration of China (CAC), released a draft policy on Friday that will require all companies to collect their users’ real names and national identification card numbers before offering them any blockchain related service. The draft regulations
  3. Windscribe VPN 1.81 Build 42 / 41 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. https://assets.windscribe.com/video/windscribe_explainer_480p.mp4 What's New: https://blog.windscribe.com/windscribe-1-81-beta-changelog-b9c557906d60 We’ve been working on this version for quite a while, existing installations should prompt you to update the app
  4. The site’s head claims that the policy of not collecting personal information allows people to be “more true to themselves. Steven Huffman, the co-founder and CEO of Reddit Reddit, the self-described “front page of the internet,” may have a key tool in its arsenal as Americans begin to question their relationship with social media: anonymity. According to Steve Huffman, the site’s co-founder and CEO, “privacy is built into Reddit.” All that’s required to create an account and post on any of Reddit’s 1.2 million forums is an email address, a user
  5. Pirate Tor Browser Pirate Tor Browser is a bundle package of the Updated Tor client Vidalia, Updated FireFox Portable browser (with Updated foxyproxy addon) and some custom configs , all has been revamped and Updated , Self extracting archive For those wanting to reach torrent webpages they cant reach on a normal browser try the updated pirate browser.. portable.. you might have seen the first version that the pirate bay shared http://piratebrowser.com/ now its been updated and revamped.. better updated links added , updated and adde
  6. Millions of BitTorrent downloaders use proxies or VPN services to protect their privacy. These tools offer anonymity by replacing one's residential IP-address with that of the privacy service. But do they really work? Luckily, there's now an open source tool people can use to test their setup. Every day dozens of millions of people share files using BitTorrent, willingly exposing their IP-addresses to the rest of the world. For those who value their privacy this is a problem, so many sign up with a VPN provider or torrent proxy service. This is fine, but some people then forget to check whe
  7. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions av
  8. Don't use VPN services. No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer. Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does. Why not? Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want - including logging. But my provider doesn't log! T
×
×
  • Create New...