essandess / isp-data-pollutionLinks
ISP Data Pollution to Protect Private Browsing History with Obfuscation
☆614Updated 2 years ago
Alternatives and similar repositories for isp-data-pollution
Users that are interested in isp-data-pollution are comparing it to the libraries listed below
Sorting:
- Take back your privacy. Lose yourself in the haystack.☆564Updated 9 months ago
- Simple random DNS, HTTP/S internet traffic noise generator☆1,748Updated 2 years ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆510Updated 7 months ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- Instructions for setting up DNS over TLS over TOR☆148Updated 5 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆130Updated 8 years ago
- KeePass 2 database master-password cracker☆134Updated 7 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,296Updated 6 months ago
- Browser fingerprinting protection for everybody.☆541Updated 10 years ago
- Snowden Archive: The SIDtoday Files☆407Updated 6 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆216Updated last year
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆547Updated 5 years ago
- A simple tool to generate fake web browsing and mitigate tracking☆285Updated last year
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆717Updated last year
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- Pollute your web history so it's worthless to buyers☆63Updated 4 years ago
- ExpressVPN Leak Testing Tools☆219Updated 4 years ago
- cryptostorm client configs☆198Updated 2 months ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆175Updated 6 years ago
- Snowden's toolkit — for the Rest of Us.☆71Updated 6 years ago
- Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the…☆310Updated 3 years ago
- Prevent user profiling via mouse tracking.☆56Updated 4 years ago
- An asemic Markov-chained cipher☆202Updated 5 years ago
- Automatic installation and configuration of DNSCrypt (on Debian + Redhat like systems). This script will install DNSCrypt and configure i…☆224Updated 7 years ago
- Obfuscate, poison and purge all your facebook data permanently☆263Updated 6 years ago
- ☆299Updated 9 years ago
- Personal Onion Router To Assure Liberty☆831Updated 6 years ago
- A censorship circumvention tool☆524Updated 6 years ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆127Updated 5 years ago
- Prototypes of ad blocking techniques proposed in the "Future of Ad Blocking" paper☆255Updated 4 years ago