Комментарии:
man u r ultimate
ОтветитьYour videos are top notch and set realistic expectations from the tools showcased from a cybersecurity perspective
ОтветитьThank you ❤️. I have a question, nipe does similar stuff, right ?
Ответитьthank you bro
ОтветитьPeace and love hackersploit
Ответитьkeep up the good work.
ОтветитьMore podcasts! Oh and it's Tor not TOR! There is also a cool open source application called SelekTor that routes all of your traffic through Tor and has a bunch of other features as well, it's also great for beginners that aren't good with the CLI.
ОтветитьTo anyone that uses a VPN to connect to Tor, you must use a TCP VPN, Tor cannot send UDP packets so if your VPN is UDP, you are not hiding your Tor usage at all!
ОтветитьSo tor is kinda like blockchain
ОтветитьSo what kinda usage you would use tor for???
Ответитьwould TOR alone be enough to use with KODI or would you still need a vpn...... A bit random I know.... just curious
ОтветитьHey, Hackersploit, what do you think about these custom built routers with VPN on the router. They get mixed reviews. Also, if I have a VPN-router and on my machine I’m running Kali and proxychains would that work? Would it basically just be like VPN over proxy ?
ОтветитьQubes running Whonix as a VM. If you really need to be a non-Qubes user, using Kali for example, you should still be connecting to a VPN via Tor.
ОтветитьHi HackerSploit, I was wondering if you could help me with a question, the laptop i just recently purchased to run tails and go on TOR has a wifi card that is not compatible with tails apparently and therefore I cannot connect to wifi (internet) on it. I was thinking about buying a wifi adapter to fix this issue. The only problem is that wifi adapters come with their own MAC addresses I'm pretty sure if I'm not mistaken. Since tails spoofs my mac address on my laptop would it automatically spoof the wifi adapters MAC address as well or just my laptop and create a fatal flaw in the security/privacy of tails defeating the purpose in using it allowing someone to find my geo location? If it does would I be able to manually change the wifi adapters MAC address and then return stability to the security/privacy of tails?
Thanks in advance your videos are insanely helpful, big fan.
This is not illegal sir in any country using dark web in tor
ОтветитьDammmit...... Don't ever use Tor..... Solution : Virtual Machine + VPN (Mullvad) + Wireguard + Whonix...... It's the setup of US Cyber command included UK too..... Warning : laptop must be bought in the dark market without fingerprint ( credit card etc.....) and No need to change Mac address because it's a Stealth computer....
ОтветитьHow to check my phone is hacked air not?
ОтветитьThanks bro. Please make a video about bridges.
ОтветитьI LOVE this. Thanks so much! This explained alot. Not I'm finding your video to change DNS thanks :)
ОтветитьThe complete deep web course 2018. >>> Accept my invitation and give me discount
Ответитьgreat thanks
ОтветитьLuv ya work mate ur a legend !! Cheers 😎👍👍
ОтветитьCCTV view from phone or PC how ?
ОтветитьYou are the best teacher for a hacking
ОтветитьSo basically this is same as using a tor browser ?
ОтветитьI am unable to install tor, when i type apt-get install tor, it says "package 'tor' has no installation candidate", can anyone help me out of this problem.? Thank you.
ОтветитьI get drugs online from ghostvendors,com. I can buy from them without fears of getting into any troubles with the feds, because they help to deliver to any address I give them.
ОтветитьSO CLEAR !!!!! Merci :))))
ОтветитьIt's telling me unable to locate package for tor... please help
Ответитьwhich OS are you using on your PC
ОтветитьI can tell you trust me 😂
ОтветитьThese videos should come with a health warning. The OPSEC is terrible. TOR is not anonymous. Using third party browser extensions to control your internet connection is even worse.
ОтветитьTnx alot for giving Information
ОтветитьNo this helped thax a lot 😍
ОтветитьThat is what i call quality content thanks bro
ОтветитьUnable to install polipo
ОтветитьE: unable to locate polipo
Ответить7 minutes of some sh*tty rant??? u serious bro? get straight to the point
ОтветитьLove your videos and your content I hope one day I can become as knowledgeable about cyber security it is a true oner to learn from you thank you very much
ОтветитьDoes this work with Terminal Multiplexer? Sorry for the dumb question
ОтветитьI'm so blessed I found this video <3
ОтветитьЭто vse - блядская наебaлоvka. Отвечаю!!!
😂😂😂😂😂
Wow man you have that spark of passion as you said, feels great to hear someone talk like that about something he loves! It's a very endless topic though, centralized vs p2p have as pros than each other have cons, like it's kinda mind-blowing to me that the network design that has the most potential for true privacy is used by both both insanely nice people (whistleblowers... etc) and insanely bad people (no need to list; still easier to do harm that good) Ty for the clear explanation, I'm less stupid (not hard)
Ответить8 minutes of rambling 😂
Ответить