Home » ARTICLES » Jolly Roger’s Security Guide for Beginners

Jolly Roger’s Security Guide for Beginners

GUIDE TABLE OF CONTENTS

DeepDotWeb.website is proud to present the “Jolly Roger’s Security Guide for Beginners.” This Guide was made by the Jolly Roger — we found the publication on the hub forums on this thread:

http://thehub7dnl5nmcz5.onion/index.php?topic=52.0

We obtained the Original Poster’s permission to re-post this guide. If you want to contact the Original Poster, this is his profile on the hub forums:

http://thehub7dnl5nmcz5.onion/index.php?action=profile;u=114

Donations

Jolly Roger has spent countless hours putting this thread together. If you gained some value and want to give back, He is accepting Bitcoin donations.

Address: 1PkJ928QWC5BuQAsHoNQzRV5wfnveJSRCp

Enjoy and stay safe!

PRIVACY TIP FOR DEEP WEB USERS: Use a VPN with Tor. Don’t fall into a false sense of security by believing that Tor is enough to protect you. If you want the very best anonymity and privacy while on the Deep Web then you need to be using a VPN with Tor. It is an extremely valuable tool in your fight for anonymity. Click here to find the best VPN for privacy on the Deep Web.

Enjoy and keep safe DeepDotWeb.website Team

  1. INTRODUCTION TO SECURE COMMUNICATION – TOR, HTTPS, SSL
  2. PGP, TAILS, VIRTUAL BOX
  3. PGP CONTINUED
  4. WHOLE DISK ENCRYPTION AND FILE SHREDDING
  5. JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES
  6. GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES
  7. EXIF DATA
  8. RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED
  9. COMBINING TOR WITH A VPN
  10. COMBINING TOR WITH A VPN CONTINUED
  11. CONNECTING TOR -> VPN FOR WINDOWS USERS
  12. TRACKING COOKIES
  13. LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC
  14. HOW FAR WILL LAW ENFORCEMENT GO?
  15. FRAUDULENT PRIVATE MESSAGES
  16. LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU
  17. LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND
  18. WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE
  19. SECURING YOUR ACCOUNT FROM FBI MONITORING
  20. INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS
  21. HOW TO CONNECT TO TOR OVER TOP OF TOR
  22. HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC
  23. VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES
  24. AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP!
  25. TOR CHAT!
  26. OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY
  27. CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL
  28. THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES!
  29. MONITORING YOU WITH AN ANTENNA!
  30. COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING
  31. A FEW SIMPLE RECOMMENDATIONS
  32. COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION
  33. THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY –
  34. PGP/GPG EMAIL ADDRESSES
  35. ANOTHER SCAM EMAIL – BEWARE
  36. AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS
  37. IT IS OBVIOUS WHEN YOU ARE USING TOR
  38. ARE YOU USING SAFE-MAIL.NET ?
  39. YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES
  40. LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT!
  41. LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS!
  42. LOCALBITCOINS PART 3 – MORE SCAM STORIES
  43. LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING
  44. HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS
  45. CAPABILITIES OF THE NSA
  46. WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES
  47. BITCOIN CLIENTS IN TAILS – BLOCKCHAIN AND ELECTRUM

Check Also

Full guide: How to access I2p sites & Use TheMarketplace.i2p

Note: TMP Does not exist anymore, but this tutorial was left as an I2P usage …

Leave a Reply

Your email address will not be published. Required fields are marked *