The Deep Web Superpack: The Ultimate Anonymous Collection
Lance Henderson
Book Details
Price
|
2.50 |
---|---|
Pages
| 501 p |
File Size
|
4,200 KB |
File Type
|
PDF format |
Series
| Darknet |
About
| Anonymity Networking |
Burners & Black Markets
Cell Opsec and the Powers That Be
“No one cared who I was until I put on the mask.”
- Bane, The Dark Knight Rises
Anonymity and Privacy
Anonymity:
Noun an*o*nym*i*ty \,a-n@-‘ni-m@-te\: the quality or state of being
unknown to most people : the quality or state of being anonymous
8 Deadly Myths of Cell Phones
How The NSA Spies On You
The NSA Fingerprints Cells
Location, Location
How the IRS Spies On You
How Google Spies On You
How Windows 10 Spies On You
How to Tell if Your Phone is Tapped
How to Stay Anonymous Overseas… in ANY Country
The 10 Best Phones for Anonymity
Blackphone
Blackphone 2
Boeing’s ‘Black’ Phone of Self- Destruction
BlackBerry
BlackBerry Security
Jailbroken Phones
Encrypting Files on BlackBerry
Decrypting Files
How to Disable Automatic OS Updates on BlackBerry 10
Older & Generic Burner Phones (aka Cheap Phones)
Nokia Lumia 520
Motorola EX-431G
Motorola Moto G (3rd Generation)
Motorola i355 Radio/Cell Phone
Samsung S150G (TracFone)
Disaster Preparedness
Questions and Answers
Where to get the best burner phones?
Faraday Cages
20 Ghost Apps for Smartphones
Signal
Orweb
Orfox
Telegram
Chat Secure
Encrypted E-mail
K-9 and OpenKeychain: Encrypted E-mail
KeySync: Syncing Trusted Identities
LastPass Password Manager
Linphone: Encrypted Video and Voice Over IP (VOIP)
ObscuraCam: The Privacy Camera
Metadata
Orbot: Proxy with Tor
Osmand: Offline Maps and Navigation
Ostel: Encrypted Phone Calls
TextSecure
Pixelknot: Hidden Messages
Your Security Needs Are Not My Own
Ghost Apps for the Black Market
First up is GRAMS, the Darknet Search Engine
DuckDuckGo
NoteCipher
Bitcoin Wallet
ChatSecure
Ghostery
FlashControl
TACO
AdBlock Plus
NoScript
uMatrix
Cell Keyloggers
Tor and Cell Phones
10 Tor Rules for Smartphone Users
Anonymous Android
How to Access Hidden Onion Sites on the Deep Web How to Access
Linux Darknet Edition
Bypassing Websites That Block Tor
Government Tracking of Tor Users
Tor & SMS Verification
Tor Pranks & Cell Phones
Black Markets on the Deep Web
The BlackMarket Superlist
DarkNet Dictionary and Other Darknet Tools
Shipping & Receiving: Thou Shalt Nots
To Finalize Early or Not?
Black Market Arrests
OPSEC for Buyers
Psych Tricks
Vendor Opsec
Postal Drops & Controlled Deliveries
Escaping the West!
Sniffer Dogs & Cash
Conclusion
Darknet
Introduction
Privacy and Anonymity
The Anonymous Tor Network
Tor and Torrents
VPNs
Tor Relays
“Who can you trust? Nobody, cause nobody wants you here.”
Freenet
I2P
Facebook and Other Misfits
Tails
How to Defeat the NSA
Tor & the Dark Art of Anonymity
Is Tor Safe?
Tor Risks
Exit Nodes
Intelligence Agencies
Quantum and FoxAcid System
Tor Step-by-Step Guide
Tor Installation
What Tor Cannot Do
Tor Apps & Anti-Fingerprinting Tools
Orbot
Invisibox
Text Secure
Red Phone
Google and Tor
Captchas
SpiderOak
Tails
Tails Limitations
Chrome
Flash Control
User Agent Switcher
CanvasBlocker
Deadly Firefox Options
Whonix & Tor
Torbirdy
Macchanger
Whonix Bridges
Tor and VPNs
Pay for a VPN Anonymously
Pay for a VPN Using a Credit Card
Tor Friendly VPNs
Using Bitcoins to Signup Anonymously to a VPN
Bitcoin Mixers
Bitcoin Wallets
Desktop
Mobile
Multibit
Multibit Windows
Multibit Linux
Paying for a VPN to Use with Tor
Using Your Real Name Outside of Tor
The Desert of the Real
Cyberbullies and Anonymity
Email Anonymity
TorGuard
Guerrilla Mail
PGP
Mymail-Crypt
AxCrypt
Torchat
ChatSecure
Telegram
CryptoCat
Freenet
Frost & Fuqid
Passwords & Tor
Changing Passwords
Storing Passwords in Tor Browser
Diceware
Preventing Non-Tor Activity From Being Linked with Tor Activity
Keyloggers
Vampire Signs
Software Keyloggers
Hardware Keyloggers
For The Children
Keylogger Prevention
Anti-Keyloggers
Darknet Markets
Fraud Prevention
When It Is Okay to FE (Finalize Early) When It Is NOT Okay
MultiSigna
Is It Safe? Is It Secret?
The Long Arm of the Law
How Most Get Caught
Darkcoin
Darkcoins for Business
Transaction Processors
Darknet OPSEC
How to Setup a Hidden Service on Tor
Configuration
Shallot and Scallion
On Running a Hidden Tor Server (and other Opsec Magic Sauce) Tor
and Your PC
NSA Slides
Situation Awareness
Darknet Personas
Tor Hidden Services - High Risk, High Reward
The Death of Anonymity
Usenet: The Ultimate Guide
What is Usenet?
The Best Newsgroups
The Best Usenet Apps
Usenet Reviews: Who Sucks. Who Doesn’t
Usenet Anonymity
Things That Break Anonymity
Moderated Usenet
Which VPNs You Can Trust
The Cloud
Escape the West!
Burn Notice and Skip Tracers
A World Wide Web of Deceit
Aliases
IP Address Searches
The Courts
How to Knit A Cloak of Invisibility
How to Create an Anonymous Bank Account
Bitcoins
Student Loans
Tax Offsets
Prevention: The Dept. of Education’s Worst Enemy
Consolidation, IBR and Forgiveness
Social Security Numbers
Employment
Things to Avoid
Universities
Labs
Dorms
Changing Your Name
White Lies
Clone Home
Passports & Canada
Anonymous Phones
How the FBI Traces Calls
Cons of Using a Burner
Pros of Using a Burner
Disappearing from Social Media
Phase 1: Nuking the Sites From Orbit
Phase 2: Nuking Criminal and Public Records
Phase 3: Staying Off The Radar
Stalkers
The Bayou Grandma Stalker
Willy Wonka Stalker Factory
The Hitchhiker
Ruin Her Life!
How to Disappear From a Stalker
Securing Your Computer
Tor
Tails
Vpns
Freenet
Frost
Counter-Forensics
Truecrypt
Drivecrypt
Veracrypt
DiskCryptor
LibreCrypt
Border Officers and Encrypted Laptops
Hiding Valuables Underground
X Marks the Spot
Google Earth
Insulation
Bury it Naked
Star Wars Shenanigans
Going Extreme
Philippines
Canada
Thailand
China
CIA Manipulation and Disappearing
Manipulation Tactics
Forging Allies
How The NSA Finds Anyone
Cell Towers
Drones
Online Footprints
Charting a New Course
Bin Laden’s Courier
Restrict Physical Access
Preserve Your Reputation
Cut Them Loose
Risky Friendships
Snowden’s Mistakes
Defeating Facial-Recognition Technology