essandess / isp-data-pollutionLinks
ISP Data Pollution to Protect Private Browsing History with Obfuscation
☆607Updated 2 years ago
Alternatives and similar repositories for isp-data-pollution
Users that are interested in isp-data-pollution are comparing it to the libraries listed below
Sorting:
- Take back your privacy. Lose yourself in the haystack.☆561Updated 11 months ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,306Updated 7 months ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- Instructions for setting up DNS over TLS over TOR☆149Updated 5 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆719Updated 2 years ago
- Personal Onion Router To Assure Liberty☆833Updated 7 years ago
- ExpressVPN Leak Testing Tools☆220Updated 4 years ago
- Simple random DNS, HTTP/S internet traffic noise generator☆1,758Updated 2 years ago
- cryptostorm client configs☆199Updated 4 months ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆175Updated 7 years ago
- Snowden Archive: The SIDtoday Files☆407Updated 6 years ago
- Snowden's toolkit — for the Rest of Us.☆72Updated 6 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆216Updated last year
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆686Updated 7 years ago
- Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark☆786Updated 2 years ago
- An all-inclusive Tor configuration for Raspberry Pi, serves as both a relay and personal Tor network☆113Updated 7 years ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆550Updated 5 years ago
- Prevent user profiling via mouse tracking.☆54Updated 4 years ago
- Forget the past. Social Amnesia makes sure your social media accounts only show your posts from recent history, not from "that phase" 5 y…☆808Updated 2 years ago
- Script collection for linux☆391Updated this week
- Prototypes of ad blocking techniques proposed in the "Future of Ad Blocking" paper☆255Updated 4 years ago
- Enterprise Onion Toolkit☆787Updated 2 years ago
- Surveillance Detection and Mapping App☆240Updated 7 years ago
- Pollute your web history so it's worthless to buyers☆63Updated 5 years ago
- Data flow in the Tor network☆537Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆126Updated 5 years ago
- Browser fingerprinting protection for everybody.☆546Updated 10 years ago