Saturday 12 December 2020

EVERTHING ABOUT TOR

 WHAT IS TOR? HOW TOR WORKS?

Tor or The Onion Router allows anonymous use of the internet velling the actual identity of the user. 

It protects the user from any traffic analysis and network spying.

Tor is perhaps the most secure option available for anonymous internet connectivity.

Tor is based on the principle of 'onion routing' which was developed by Paul Syverson, Michael G. 

Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990s.

The alpha version of Tor named 'The Onion Routing Project' or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20,2002. Further development was carried under the financial roof of the Electronic Frontier Foundation (EFF).

The Tor Project Inc. is a non-profit organization that currently maintains Tor and is responsible for its development. It is mainly funded by the United States Government, further aid is provided by the Swedish Government and different NGOs and individual sponsors.

Friday 11 December 2020

WHAT IS ROOTING ?

Rooting is the process of allowing users of smartphones, tablets, and other devices running the Android mobile operating system to attain privileged control (known as root access) over various Android subsystems. As Android uses the Linex kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

IS ROOTING ILLEGAL?

No. Technically, It once was, but exceptions to the DCMA have made it legal for most phones (but not necessarily tablets).

Either way, it's hard to imagine anyone actually enforcing this rule (much like ripping DVDs for your own personal use).

CAN I UNROOT MY PHONE?

Yes. If you decide you don't like being rooted, you can often find instructions on unrooting your phone as well.

Usually, it involves flashing an RUU, SBF, or something similar to return the phone to truly stock settings.

WILL ROOTING VOID MY WARRANTY?

Yes. Unlocking your bootloader will void the warranty on your phone, even if your manufacturer provides a way for you to do it.

That said, if you need warranty service for a hardware issue, you can sometimes unroot your phone and take it in for service with no one the wiser.

COULD ROOTING BRICK MY PHONE?

It's possible but pretty unlikely.

As long as you follow instructions well, you probably won't brick anything ( but we're not responsible yadda yadda yadda). 

Flashing custom kernels and radios is a little riskier than just rooting or flashing ROMs, but again, if you follow directions you should be okay.

Keep in mind that bricking means your phone won't turn on or function at all - if you're stuck in a boot loop or boot straight to recovery, your phone is not bricked, and it can be fixed.







Monday 7 December 2020

ALL ABOUT DARKNET

What Is Dark Net?

Darknet is an overlay network that can only be accessed using specific software, configuration, or authorization.

It is part of the Deep Web because its content is not accessible through search engines.

But it is something more, it is anonymous.

It hosts an anonymous website.

Yeah, you wouldn't know who the owner is unless he explicitly reveals his information.

It offers full anonymity to users too.

Darknet anonymity is usually achieved using an 'onion network'.

I am sure you have cut an onion once in your lifetime and you had been crazy about the number of layers it has, same happens when you use an onion network.

There is a number of encryption layers that hide your true identity.

USES OF DARKNET:

To better protect the privacy right of citizens from targeted and mass surveillance.

Whistleblowing and news leaks.

Hacking and computer Crime. Maybe, you may want to chat with the most dangerous of hackers.

Sale of restricted goods.

File sharing.


CAN WE ACCESS DARKNET?

Well, the most popular way to access Darknet is by using the TOR browser.

Technically, It stand s for 'The Onion Router' and it is as simple as installing a new browser.

After that, you would need a URL or directory that contains URLs to different websites or classes of websites so that you know what to type in into the browser's address bar.

You can easily get URLs in the Onion Directory of Darknet or just google for DarknetSites.

Make sure you use the TOR browser.

Download here: TOR browser




Thursday 3 December 2020

What information can Hackers gain when they hack your mobile?

 When a hacker gets into your phonethey will try to steal access to your valuable accounts. Simply, we can say that they can do all the thing what they want in your phone except for some protected features. Hacker's check your social media and email for password reset prompts unusual login locations or new account signup verifications. You notice unfamiliar calls or texts in your logs. Hackers may be tapping your phone with an SMS trojan.