DeepWebFeed is proud to present the “Jolly Roger’s Security Guide for Beginners.”.
This Guide was made by the Jolly Roger - found on the hub forums a while ago.
Donations
Jolly Roger has spent countless hours putting this thread together. If you gained some value and want to give back, He is accepting Bitcoin donations.
Address: 1PkJ928QWC5BuQAsHoNQzRV5wfnveJSRCp
Enjoy and stay safe!
PRIVACY TIP FOR DEEP WEB USERS: Use a VPN with Tor. Don’t fall into a false sense of security by believing that Tor is enough to protect you. If you want the very best anonymity and privacy while on the Deep Web then you need to be using a VPN with Tor. It is an extremely valuable tool in your fight for anonymity. Click here to find the best VPN for privacy on the Deep Web.
1. Introduction to Secure Communication - Tor, HTTPS, SSL
3. Whole Disk Encryption & File Shredding
4. JavaScript Vulnerabilities & Removing Metadata From Files
5. General Safety Precautions When Posting Online, Learn From Other's Mistakes
6. EXIF Data
7. Retaining a Lawyer, How to Handle Getting Caught or Interrogated
9. Connecting Tor -> VPN For Windows Users
10. Tracking Cookies
11. Learning from Other's Mistakes: Libertas, DPR, Sabu, LulzSec
12. How Far Will The Law Enforcement Go
13. Fraudulent Private Messages
14. Learning From Other's Mistakes: How They Busted Sabu
15. Where You Might Consider Running To, If You Had No Other Choice
16. Securing Your Account From FBI Monitoring
17. Invincibility Mindset, Federal Government Bullying Tactics
18. How To Connect to Tor Over The Top of Tor
19. How to Verify Your Downloaded Files Are Authentic
20. Verifying Signed Messages With Signatures & Signing Your Own Messages
21. An Example of Really Bad OpSec - Smarten Up!
22. Tor Chat
23. Obtaining, Sending and Receiving Bitcoin Anonymously
24. Clearnet vs. Hidden Services - Why You Should Be Careful
25. They Are Watching You - Viruses, Malware, Vulnerabilities
26. Monitoring You With An Antenna
27. Cookies & JavaScript Revisitied, Plus Flash Coockies & Other Browser Tracking
29. Cold Boot Attacks, Unencrypted RAM Extraction
30. The Strength of Cryptography and Anonymity When Used Properly
32. Another Scam Email - Beware!
33. An Introduction to An Expert on OpSec, Plus MD5 & SHA-1 Checksums
34. It Is Obvious When You Are Using Tor
35. Hiding Tor From Your ISP: Bridges & Pluggable Transports
36. Why You Should ALWAYS Back Up Your Drives, Especially Encrypted Ones