• chevron_right

      Proxychains – Run Commands and Applications using Proxy Tunnels

      vegancluster · Monday, 20 December, 2021 - 15:34

    Require to run commands and applications through secure tunnel of #Tor nodes? Then why don't you use #proxychains. Proxychains is free and open-source tool that utilize tor nodes to tunnel all connection of applications and commands to make it secure.

    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.5.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated DNSCrypt to version 2.1.1.
    * Added current connection status to the notification.
    * Added tiles to Android Quick Settings for starting/stopping modules.
    * Optimized application behavior on unstable networks.
    * Optimized battery usage when network connection is unavailable.
    * Improved websites handling for the Tor Exclude/Select websites feature.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    • person chevron_right

      صنّاع الملاحم 5 | ولاية غرب إفريقية | الدولة الإسلامية | ربيع اﻷول 1443 هـ

      Monday, 1 November, 2021 - 17:03 edit

    https://d.tube/#!/v/jundi1443-2/QmboxsVUhoQ68es2JB3qP3aoEk2xCfs76zVdJuCL78K97k

    غرف أنصار #الدولة_الإسلامية #Matrix #Element https://app.coffespot.com/#/room/!TVldOfGLGjkOaTeaCR:coffespot.com موقع #فهرس #الأنصار + #tor https://fahras.link/news/1847 http://fahras4fw3s5bi3enjrompr6kxpywkscqmmcvyiyey3xamrv5zjllgad.onion/news/1847 موقع #إعلام + #tor + #hns http://i3lam.hns.to https://i3lam.in/23425 http://i3lam7sb2m367t3g7e57l3isedjnmmffy5ousw4peeml7hf2nsytbmad.onion/23425 #الدولة_الإسلامية - #ديوان #الإعلام المركزي #المكتب_الإعلامي لـ #ولاية #غرب_إفريقية - #مرئي : #صنّاع_الملاحم 5 #ربيع_الأول #1443 هـ The #IslamicState - #Diwan of #Media #WestAfrica #Wilayah - #Video : The #MakersOfEpicBattles 5 #RabiAlAwal 1443 H

    #الخلافة #خلافة #باقية #الإسلام #المسلمين #الجهاد #جهاد #حرب #معركة #إفريقية #إفريقيا #نيجيريا #Khilafah #Caliphate #Remaining #Islam #Muslims #Jihad #War #Battle #Africa #Nigeria

    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.4.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated DNSCrypt to version 2.1.0.
    * Updated Tor to version 4.5.10.
    * Updated Tor Snowflake bridge to version 1.1.0.
    * Updated Purple I2P to version 2.39.0.
    * Block system DNS over TLS and DNS over HTTPS when DNSCrypt ignore_system_dns is enabled.
    * Restart InviZible when Tor fails in the background.
    * Added HardwareAccel option to Tor settings.
    * Updated Tor default bridges.
    * Minor bug fixes and optimizations.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    • chevron_right

      Android application for on-line privacy and security.

      D2I · Friday, 28 May, 2021 - 11:35 · 2 minutes

    InviZible Pro. (Open source) New version 5.3.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    • InviZible Pro does not support ipv6 at this time.

    Features: * No root required * Hides location and IP * Unblocks the restricted web content * Prevents tracking * Allows access to hidden networks * ARP spoofing detection * Built-in firewall * Tethering supported * No analytics * No advertisements * Open source * Material design theme

    Premium feature: * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P. * Absence of reminder about the need to support the project. * Priority technical advice. * Material design night theme

    What's New * Updated Tor to version 4.5.8. * Switch snowflake bridge front domain and host to fastly CDN. * Updated Purple I2P to version 2.38.0. * Improved DNS handling. * Always use a full Tor restart when pressing the new identity button. * Show apps that are allowed Internet access at the top of the list in the firewall. * Minor bug fixes and optimizations.

    Please visit the project’s page: https://invizible.net/en

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro

    Android application for on-line privacy and security.

    InviZible Pro. (Open source)
    New version 5.2.1

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

    Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

    The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

    InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

    - InviZible Pro does not support ipv6 at this time.

    Features:
    * No root required
    * Hides location and IP
    * Unblocks the restricted web content
    * Prevents tracking
    * Allows access to hidden networks
    * ARP spoofing detection
    * Built-in firewall
    * Tethering supported
    * No analytics
    * No advertisements
    * Open source
    * Material design theme

    Premium feature:
    * Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
    * Absence of reminder about the need to support the project.
    * Priority technical advice.
    * Material design night theme

    What's New
    * Updated Tor to version 4.5.7.
    * Updated Purple I2P to version 2.37.0.
    * Updated Tor Snowflake bridge.
    * Improved user interface interactivity.
    * Added Spanish translation.
    * Bugs fixes and stability improvements.

    Please visit the project’s page: https://invizible.net

    Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    Take a look at source code: https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro


    InviZible Pro. (Open source)
    New version 5.2.0

    Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

    InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

    Project’s page: https://invizible.net

    https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

    https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

    https://github.com/Gedsh/InviZible

    #android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro
    • Fo chevron_right

      Tor Explained: What is Tor? How Does It Work? Is It Illegal?

      pubsub.do.nohost.me / FossBytes · Tuesday, 23 February, 2021 - 09:38 · 6 minutes

    tor browser

    What Is Tor?

    The Onion Router or Tor is a network that enables a user to stay anonymous on the internet and get rid of any possible surveillance, user identification, or location tracking while using the internet. You can access the Tor network with the help of a modified Mozilla Firefox ESR web browser.

    Tor allows a person to browse the web anonymously by veiling the actual identity of the user. It protects the user from any traffic analysis and network spying.

    Tor is perhaps the most popular and secure option available for anonymous internet connectivity. To reduce the confusion, here we are talking about the Tor network, not the Tor web browser, which is used to access the same.

    Who Created Tor?

    Tor uses the principle of ‘Onion Routing,’ which was developed by Paul Syverson, Michael G. Reed, and David Goldschlag at the United States Naval Research Laboratory in 1990s. Further development was carried out under the financial roof of the Electronic Frontier Foundation (EFF).

    Tor Project Inc. is a non-profit organization that currently maintains Tor and is responsible for its development. It has received funds from the US government primarily, and additional aid from the Swedish Government and different NGOs & individual sponsors.

    How Does Tor Work?

    Tor uses the concept of the ‘Onion Routing’ method in which the user data is first encrypted and then transferred through different relays present in the Tor network. Thus, it creates multi-layered encryption (layers like an onion) and a hard-to-follow path to keep the identity of the user safe. As a result, nobody can link your identity to any single point.

    One encryption layer is decrypted at each successive Tor relay, and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus tough to trace the identity of the user or the server by any surveillance system acting as the middleman.

    Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers in the form of Tor Hidden Services. Also, P2P applications like BitTorrent can be configured to use the Tor network and download torrent files.

    Also Read: How To Share Files Anonymously Using Tor’s Darknet And OnionShare?

    Is using Tor illegal?

    No. Tor browser and dark web aren’t illegal on their own. However, if you end up performing some illegal activity on the dark web using Tor, that’ll surely invite trouble. So, as always, we recommend that you use this technology to perform legal actions and enhance your privacy.

    Tor And NSA Connection

    The NSA whistle-blower Edward Snowden used Tor to leak information about PRISM to The Guardian and The Washington Post.

    However, the story is not all good-good. Tor faces criticism for the reason that it acts as a medium for different illegal activities like data breaching, drug dealing, gambling, being home to dark web sites. Tor is also used by criminal minds to communicate over the internet while keeping their identity hidden, which makes it difficult for the security agencies to trace them.

    The U.S. National Security Agency (NSA) has called Tor “the King of high secure, low latency Internet anonymity.” And it has received similar comments by BusinessWeek magazine, “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world.”

    Another speculation made is that Tor takes its funding from the U.S. Government, which may lead to the assumption that NSA may have compromised the identities of individual Tor users. However, Tor’s former executive director Andrew Lewman disclaimed any confederations with NSA.

    Is Tor Browser Safe?

    Various claims have been made about compromising Tor’s anonymity and security from time to time. The most famous one was the Bad Apple Attack, in which the researchers claimed to have identified around 10k IP addresses of active BitTorrent users who were connected via Tor.

    The Heartbleed bug was behind another major compromise in April 2014, which halted the Tor network for several days.

    Traffic Fingerprinting is a method used to analyze web traffic by analyzing the patterns, responses, and packets in a particular direction. This technique can be used to attack the Tor network by making the attacker’s computer act as the guard.

    The main vulnerability was found at its exit points, where the level of security is very low as compared to the rest of the Tor network.

    Also Read: TOR Anonymity: Things Not To Do While Using TOR

    What is Tor “Browser”?

    Tor Project Inc. has released Tor Browser , which is a modification of an Extended Support Release (ESR) version of the Mozilla Firefox browser. The browser is portable so that it can be used from external media and also reduces the hassel of installation.

    Tor Browser removes the browsing history and cookies after every use, thus reducing the risk of any cookie tracking. We can set-up SOCKS (Socket Secure) based applications to use the Tor network by configuring them with a loop-back address.

    It’s also known as the dark web browser since it lets users browse the so-called dark web sites that accessible on the regular web.

    The Tor browser is available for various desktop operating systems, including Windows, Linux, and macOS. You can visit this link to download Tor Browser latest version for Windows, Linux, and macOS.

    Tor 10.0.6 Tor 10.0.6

    How to download and use Tor browser?

    How to install Tor Browser on Windows 10/7/8?

    1. Run the Tor Browser setup.
    2. Choose your desired language.
    3. On the next window, choose the destination folder. Using Tor would be easy if you choose the Desktop as the destination.
    4. Click Install.

    The Tor setup will create a folder named Tor Browser on your Desktop. Open the folder, and run the shortcut file to use the Tor Browser.

    For Linux, you’ll have to extract the downloaded file, either using the command line or a file extractor application.

    Tor Browser for Android

    Tor Browser – official Tor app for Android

    Orbot – a free proxy app with Tor for Android devices.

    Orfox – a mobile version of Tor Browser for Android devices. (Discontinued)

    The Guardian Project, a global developer community founded by Nathan Freitas, is to be credited for the development of Orfox.

    Tor Browser for iOS

    A Tor browser app for iOS created by Tor Project core contributor Mike Tigas.

    Tor Alternatives

    I2P and Freenet are other anonymity networks which can act as Tor alternatives. Also, Tails and Subgraph OS are Linux-based distributions with built-in Tor support. In the past, Hornet was also an anonymity network that provided higher network speeds compared to Tor.

    To know more about these alternatives, please visit this link .

    Should I Use Tor?

    Tor has proved to be an excellent medium for safe, secure, and anonymous web presence available to a user at no cost. The developers of Tor didn’t intend it to become a hotbed of illegal activities, but evil-minded people have leveraged Tor for their benefits such as selling unlawful stuff on the dark websites. The Tor project has led to an optimistic approach towards censorship and surveillance-free internet.

    You can use Tor if you want to conceal your identity on the web or access some websites that blocked in your region. But refrain yourself from doing anything that’s above the law because nothing is fool-proof, and they can still catch you. Also, accessing your social media accounts over Tor can expose your identity.

    The post Tor Explained: What is Tor? How Does It Work? Is It Illegal? appeared first on Fossbytes .