22MarThe Top 5 Books on Privacy and SurveillanceOpen your eyes... while you still can Want to learn more about the fight for privacy? We're going to take a look at the five most incredible books on privacy and government surveillance. 11MarHow to Hack Webcams RemotelyYou should probably tape over all your cameras Learn how to hack into anyone's webcam remotely. Using this simple technique we can hack the cameras in laptops, desktops or even smartphones. 2MarHow to Send Secure Emails with ProtonMailDon't go down without a fight ProtonMail is the world's largest secure email service, developed by CERN and MIT scientists. It is open source and protected by Swiss privacy law. 25JanHow to Use Tor Browser?Are you ready to be no one? Tor is a free software that prevents others from learning your identity, location or browsing habits by letting you communicate anonymously on the Internet. 25JanHow Tor worksThe onion that makes NSA cry Tor is a free software that prevents others from learning your identity, location or browsing habits by letting you communicate anonymously on the Internet. 25JanWhy Should You Use Tor Browser?To be left alone is the most precious thing one can ask of the modern world Learn about the best tool to protect your privacy, one that Edward Snowden himself uses. What exactly is TOR and how does it work? Let's find out. 19JanThe Zero Trust PrincipleThe only way to never be disappointed To be privacy conscious is to remain vigilant at all times. Being skeptical of all security claims without proof is the only way to truly protect yourself. 9JanChoosing a Strong Password in 2017Your first and last line of defence. Learn what makes a password secure, what outdated techniques you must abandon and how to choose a strong password in 2017. 11NovGovernment SurveillanceThe ones meant to be protecting us.. The Snowden leaks have lead to mass state-sponsored surveillance becoming the defining debate of our times. Which side are you on? 1NovAnonymousWe are Legion. We do not forgive. We do not forget. Get to know the most infamous and powerful group of hackers: Anonymous. Who are they? What do they do? And how does one join them? 2OctThe Deep WebJust close your eyes and take a deep breath. Becoming a hacker exposes you to a lot of things. Apart from interesting software and applications you get to see the inner workings of the virtual world. You get to... 27SepGeneral ProtectionBuilding a strong foundation How to protect yourself from hackers? How can you keep your data and privacy safe? How to not be a victim? Let's find out. 16SepUsing ProxiesBecause Privacy = Freedom Let’s start from general meaning of word ‘proxy’. It’s actually an agent/substitute or anybody acting at place of any other. Technically, proxies are used to bypass some firewall restrictions, maintaining... 4SepChoosing A Strong PasswordDo it now before you become a statistic Password strength is a measure of the effectiveness in resisting cracking attempts. It is a function of length, complexity and randomness. 27JunLimits Of LegalityDancing with the devil As you become a better hacker, staying on the right side of the legal lines can mean the difference between freedom and a lifetime behind bars.+1 143k Pin 86k Tweet 309kShare 252kReddit 117kShares 907k