Generate random phone numbers for all countries using the mobile phone generator. These numbers are fake, but they are built using the validations of telephone numbers.
For a price of a cinema ticket a month we offer a physical phone number. All your messages are encrypted with your personal key that we cannot access. Has a REST API you can send and receive messages through. They can store contact lists for you, deniably they claim. Accepts cryptocurrency for payment.
This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely.
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg or the Mossad if they’re out to find you? Probably not … Mossad will be doing “Mossad things” and will probably find you no matter how hard to try to hide.
Creative Commons Attribution 4.0 International (cc-by-4.0)
A single command sets up a brand new Ubuntu 16.04 server running a wide variety of anti-censorship software that can completely mask and encrypt all of your Internet traffic. Uses Vagrant and Ansible to automate the process, from creation of OS image to deployment. Generates documentation as an HTML page to send to whomever you want to use the VPN server. Sets up a verified mirror of all the software the user might need, including VPN clients. Even implements techniques for evading some network blocking methods.
An online service that acts as a telephony middleman - you tell them what number to call, what number you want to show up on both Caller ID and the bill, and what your number is, and they'll connect the two numbers with the spoofed information of your choice.
A list of open proxy servers on the Net usable by anyone that connects to them. Updated often!
Has RSS feeds of everything it's found for automatic analysis.
Amazingly, this service is still around and still updated.
An application which makes it easier to tunnel IP traffic through the Tor darknet. Stand-alone application. The OS you run this on must have support for IPv6 enabled, though OnionCat can be configured to use IPv4 as well. Gives hidden services IPv6 addresses to make them easier to connect to. Also makes it possible to provide hidden services as easily as one can provide public services on the Net, such as SMTP, DNS, and even VPN.
software opensource privacy crypto anonymity tor tun ipv6 ipv4
A command line utility which makes it easy to use certain applications with Tor.
A stripped-down web browser designed for use with the Tor darknet. Based on Webkit.
web www browser webbrowser tor anonymity privacy
A suite of shell scripts to automate the installation and configuration of FreeBSD in such a manner as to support anonymity and security. Helps with the rapid deployment of BSD machines that can then be used as Tor nodes, hidden service providers, and locked-down desktop machines.
software opensource github freebsd anonymity security scripts installer tor
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
A website that offers email addresses that are only good for ten (10) minutes at a time, though you can opt to extend their lifetime to 100 minutes if you keep refreshing it.
Anonymously and securely send files to and receive files from people. Zips up the files, starts a local web server on your computer with a link to this zip file, makes this website accessible as a Tor onion service, and shows you the URL of the web server. You send someone this .onion URL, they load it in Tor Browser and then they can download the zip file. As soon as the download is complete, OnionShare shuts down the web service. Can be used to host an entire (static) website.
A collection list of selfhosted apps to increase one's privacy and possibly anonymity. webapps tools
APAF is a set of modules for Python that make it easier to develop network applications (it's built on top of Twisted) that run inside of darknets primarily (the Tor network, in particular). Cross platform. Designed to be run portably (i.e., without installation). Tries to make it as easy as possible to set up the networking stuff so you can concentrate on the application stuff. Engineered so that the traffic runs over Tor nicely and safely, but ensuring that you don't screw up and leak data is up to you.
3515 links, including 130 private