DeepDotWeb.com is proud to present the “Jolly Roger’s Security Guide for Beginners.” This Guide was made by the Jolly Roger — we found the publication on the hub forums on this thread:
http://thehub7dnl5nmcz5.onion/index.php?topic=52.0
We obtained the Original Poster’s permission to re-post this guide. If you want to contact the Original Poster, this is his profile on the hub forums:
http://thehub7dnl5nmcz5.onion/index.php?action=profile;u=114
Donations
Jolly Roger has spent countless hours putting this thread together. If you gained some value and want to give back, He is accepting Bitcoin donations.
Address: 1PkJ928QWC5BuQAsHoNQzRV5wfnveJSRCp
Enjoy and stay safe!
PRIVACY TIP FOR DEEP WEB USERS: Use a VPN with Tor. Don’t fall into a false sense of security by believing that Tor is enough to protect you. If you want the very best anonymity and privacy while on the Deep Web then you need to be using a VPN with Tor. It is an extremely valuable tool in your fight for anonymity. Click here to find the best VPN for privacy on the Deep Web.
Enjoy and keep safe DeepDotWeb.com Team
- INTRODUCTION TO SECURE COMMUNICATION – TOR, HTTPS, SSL
- PGP, TAILS, VIRTUAL BOX
- PGP CONTINUED
- WHOLE DISK ENCRYPTION AND FILE SHREDDING
- JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES
- GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES
- EXIF DATA
- RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED
- COMBINING TOR WITH A VPN
- COMBINING TOR WITH A VPN CONTINUED
- CONNECTING TOR -> VPN FOR WINDOWS USERS
- TRACKING COOKIES
- LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC
- HOW FAR WILL LAW ENFORCEMENT GO?
- FRAUDULENT PRIVATE MESSAGES
- LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU
- LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND
- WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE
- SECURING YOUR ACCOUNT FROM FBI MONITORING
- INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS
- HOW TO CONNECT TO TOR OVER TOP OF TOR
- HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC
- VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES
- AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP!
- TOR CHAT!
- OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY
- CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL
- THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES!
- MONITORING YOU WITH AN ANTENNA!
- COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING
- A FEW SIMPLE RECOMMENDATIONS
- COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION
- THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY –
- PGP/GPG EMAIL ADDRESSES
- ANOTHER SCAM EMAIL – BEWARE
- AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS
- IT IS OBVIOUS WHEN YOU ARE USING TOR
- YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES
- LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT!
- LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS!
- LOCALBITCOINS PART 3 – MORE SCAM STORIES
- LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING
- HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS
- CAPABILITIES OF THE NSA
- WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES
- BITCOIN CLIENTS IN TAILS – BLOCKCHAIN AND ELECTRUM