essandess / isp-data-pollutionLinks
ISP Data Pollution to Protect Private Browsing History with Obfuscation
☆606Updated 2 years ago
Alternatives and similar repositories for isp-data-pollution
Users that are interested in isp-data-pollution are comparing it to the libraries listed below
Sorting:
- Take back your privacy. Lose yourself in the haystack.☆562Updated 6 months ago
- cryptostorm client configs☆197Updated 3 months ago
- Metadata Anonymisation Toolkit☆100Updated 5 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,281Updated 2 months ago
- Simple random DNS, HTTP/S internet traffic noise generator☆1,734Updated last year
- ExpressVPN Leak Testing Tools☆219Updated 3 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- KeePass 2 database master-password cracker☆133Updated 7 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆131Updated 8 years ago
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆987Updated 8 years ago
- Pollute your web history so it's worthless to buyers☆63Updated 4 years ago
- Obfuscate, poison and purge all your facebook data permanently☆263Updated 6 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- Enterprise Onion Toolkit☆785Updated last year
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆539Updated 5 years ago
- Prototypes of ad blocking techniques proposed in the "Future of Ad Blocking" paper☆255Updated 3 years ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆175Updated 6 years ago
- Snowden's toolkit — for the Rest of Us.☆72Updated 6 years ago
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance☆353Updated 5 years ago
- An all-inclusive Tor configuration for Raspberry Pi, serves as both a relay and personal Tor network☆113Updated 7 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆216Updated last year
- Snowden Archive: The SIDtoday Files☆407Updated 6 years ago
- A censorship circumvention tool☆520Updated 6 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆706Updated last year
- Browser fingerprinting protection for everybody.☆541Updated 9 years ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆125Updated 5 years ago
- OONI Probe network measurement tool for detecting internet censorship☆811Updated 7 months ago
- pdf watermark removal library for academic papers☆552Updated 4 years ago
- ☆1,934Updated 4 years ago
- Data flow in the Tor network☆530Updated 6 years ago