Skip to main content

Hack in secret with the Darknet


If you think it is only a couple of terrorists that is being watched by the authorities, think again. 

Have a look at the google transparency report (click this link) . Google and other companies comply with thousands or requests for information about specific user accounts from authorities all over the world!

 In 2015 there where 68 908 requests where they provided data to authorities … with other words give access to the gmail accounts. These stats are from google themselves! You will also notice when you look at the graph that the number of requests per year is growing. Keep in mind, that this is just gmail. All other email providers receive similar requests.

There is of course the 'If you have nothing to hide' argument. In a perfect world that might make some sense. We live in an imperfect world where nothing is truly black or white, where the good guys is never 100% good and the bad guys never (well seldom) 100% bad.

You can't just simply trust that you are only being watched by the 'good guys' and that every employee working at the 'good guys' will never use the information they can get for malicious purposes.
"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say" - Edward Snowden
redpill do not encourage or condone any illegal activity. Do not use your hacking and spy software legally - respect other people's privacy - but also fight for your own privacy!

What can you do to protect your privacy?

Encrypt your emails using PGP.

You don't need to encrypt all your emails, but if there are some correspondence that you think needs to stay private, you can encrypt your emails. An easy way to do this is to use gmail with mailvelope. See the video below:


Use the Darknet

To be anonymous and to hide your IP address, you can work on the Darknet. With the Internet one computer connects to another computer and it is easy to get the IP address of the original computer.
On the darknet, internet requests are bumped around on computers (or nodes) in a way that it is not possible to get the original IP Address.

You use the darknet with special software like Tor.

How Tor Works:


Tor uses a network of computers to let your encrypted internet request jump around several computers. There is no way for the authorities to check who visited the website.

To use Tor is easy, just install it and use Tor instead of your normal browser. You can still use your normal browser for activities that you feel you don't need to keep private. 

Tor is free and can be downloaded at: https://www.torproject.org


Comments

  1. If you wish to get some cool apps for hacking, you have to have a glimpse at this app

    ReplyDelete

Post a Comment

Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at:
http://spysoftware.redpill.co.za -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
http://spysoftware.redpill.co.za
-----------------------------------------------------------------------------------------------
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet
redpil…