essandess / isp-data-pollution
ISP Data Pollution to Protect Private Browsing History with Obfuscation
☆607Updated 2 years ago
Alternatives and similar repositories for isp-data-pollution
Users that are interested in isp-data-pollution are comparing it to the libraries listed below
Sorting:
- Take back your privacy. Lose yourself in the haystack.☆565Updated 2 months ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆507Updated 3 weeks ago
- cryptostorm client configs☆196Updated last week
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- Instructions for setting up DNS over TLS over TOR☆149Updated 5 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆699Updated last year
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆173Updated 6 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,267Updated 2 weeks ago
- OONI Probe network measurement tool for detecting internet censorship☆791Updated 3 months ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- An artware browser add-on to protect privacy in web-search. By issuing randomized queries to common search-engines, TrackMeNot obfuscates…☆378Updated 3 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆130Updated 7 years ago
- Personal Onion Router To Assure Liberty☆825Updated 6 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆985Updated 7 years ago
- PrivacyFox tweaks various preferences in Firefox in order to enhance the privacy of users; it will also try to enforce these changes to m…☆154Updated 7 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆674Updated 6 years ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆535Updated 5 years ago
- Disconnect is a browser extension that makes the web faster, more private, and more secure.☆786Updated 3 years ago
- Snowden Archive: The SIDtoday Files☆405Updated 5 years ago
- Privacy Possum makes tracking you less profitable☆767Updated 2 years ago
- Pollute your web history so it's worthless to buyers☆63Updated 4 years ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆245Updated 8 months ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆122Updated 5 years ago
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance☆354Updated 5 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 7 years ago
- An all-inclusive Tor configuration for Raspberry Pi, serves as both a relay and personal Tor network☆111Updated 7 years ago
- Metadata Anonymisation Toolkit☆99Updated 5 years ago
- Forget the past. Social Amnesia makes sure your social media accounts only show your posts from recent history, not from "that phase" 5 y…☆804Updated last year
- Configures a tor client's ExcludeExitNodes torrc option to avoid exit relays without ContactInfo☆13Updated 4 years ago