Skip to main content

How to stay anonymous on your Android

  How to stay anonymous on your Android


In this era of mass surveillance it has become more important than ever to keep your online activity away from preying eyes. In this war of anonymity TOR is the number one saviour. For desktop the setup is quite easy as it only involves installing the TOR browser but the process is quite complicated on Android.


Requirements:

A rooted android device and make sure that you have enabled application installation from unknown sources as some apps are not available on play store. Lets get started.


STEP 1> Install Orbot 

In its simplest form, Orbot, by the great people over at the Guardian Project, is the connector between your device and the Tor network. It facilitates the passage of data from your apps to the Tor network, but it can only do so with apps that support data being sent through a proxy. Because of that limitation, it's necessary to have both Orbot and OrWall installed on your device, since OrWall will help with apps which do not have proxy support.

The first time you open the app, you'll have to complete the set-up wizard, but afterwards, all you have to do is long-press the Power button in the center to activate Orbot. If at any time you want to change your Tor Identity to a different IP address, you can swipe across the main screen, which will come in handy if you don't want to stray on the same IP address for too long.

STEP 2> Install Orfox 



Last up we have the companion browser which the developers at the the Guardian Project created for Orbot, called Orfox. While Orbot creates the connection to Tor, Orfox is what actually lets you use it to surf the web.

Since your data will be bouncing around through the vast labyrinth of international Tor servers, it will feel like your connection has slowed down, but that this the price you must pay for anonymity. As an added bonus, Orweb can also bypass most network restrictions so you can finally get in some quality Reddit browsing even through your office's firewall.

Thats it! Enjoy your anonymity.

Comments

Popular posts from this blog

5 ways you are being Hacked

    5 Ways You are Being Hacked W eb monitoring and mass surveillance has become a headache for most of us. Everyday some new malware makes its way into our lives through websites and applications that we use. It is important for you to know where the loopholes exist and eradicate them as soon as possible. So here are the top 5 ways people are getting hacked. 1> Password reuse It may not sound to be a serious issue but it is one of the main reason responsible for password. What people do is that they use same password for every account that exists and make it easy for an attacker to hack all of their data in one go.Make sure you have a unique and strong password for each log in. It makes it harder for us to remember each and every password ,thus password managers were created.   2>Malware downloads If you surf the web regularly and try new apps for your mobiles, chances are you already downloaded some malware or will invite them in the near future. 30,000 websites a

How To Encrypt Keyboard To Avoid Keyloggers

How To Encrypt Keyboard To Avoid Keyloggers If we start encrypting keystrokes of a keyboard the value that keylogger will record will be different from the actual value, it means that they would only record random characters. We will be using Keyscrambler software to encrypt our keyboard. So have a look on simple steps below to implement this in your Windows PC. Steps To Encrypt Keystrokes To Avoid Keylogger Attacks :- Step 1 . First of all download and install the tool KeyScrambler. Step 2 . Now after downloading, install it and after complete installation, you have to reboot your system. Step 3 . Now when your computer boots up, right click on the icon of KeyScrambler in the system tray at the bottom of a screen. Step 4 . Now choose options from there and Keyscrambler will open and you will see the screen like below. Step 5 . Now you can alter settings in this according to your wish and after that simply click on ok. Now your key scrambler app is ready,

The Hacker's Dictionary

               ----- The Hacker's Dictionary----- Are you new to the realm of hacking? Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition. Anything includes: Abbreviations, Phrases, Words, and Techniques.The list is in alphabetical order for convenience!                                  -----Abbreviations----- DDoS  : Distributed Denial of Service DrDoS  : Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple IPS. Amplification of power in the attack could occur. FTP  : File Transfer Protocol. Used for transferring files over an FTP server. FUD  : Fully Undetectable Hex  : In computer science, hexadecimal refers to base-16 numbers. These are numbers that use d