Комментарии:
Wow man you have that spark of passion as you said, feels great to hear someone talk like that about something he loves! It's a very endless topic though, centralized vs p2p have as pros than each other have cons, like it's kinda mind-blowing to me that the network design that has the most potential for true privacy is used by both both insanely nice people (whistleblowers... etc) and insanely bad people (no need to list; still easier to do harm that good) Ty for the clear explanation, I'm less stupid (not hard)
ОтветитьЭто vse - блядская наебaлоvka. Отвечаю!!!
😂😂😂😂😂
I'm so blessed I found this video <3
ОтветитьDoes this work with Terminal Multiplexer? Sorry for the dumb question
ОтветитьLove your videos and your content I hope one day I can become as knowledgeable about cyber security it is a true oner to learn from you thank you very much
Ответить7 minutes of some sh*tty rant??? u serious bro? get straight to the point
ОтветитьDoes anyone know how to open TOR from withen the Command Prompt Terminal so I can run some commands in Private??
ОтветитьE: unable to locate polipo
ОтветитьUnable to install polipo
ОтветитьThat is what i call quality content thanks bro
ОтветитьNo this helped thax a lot 😍
ОтветитьTnx alot for giving Information
ОтветитьThese videos should come with a health warning. The OPSEC is terrible. TOR is not anonymous. Using third party browser extensions to control your internet connection is even worse.
ОтветитьI can tell you trust me 😂
Ответитьwhich OS are you using on your PC
ОтветитьIt's telling me unable to locate package for tor... please help
ОтветитьSO CLEAR !!!!! Merci :))))
ОтветитьI get drugs online from ghostvendors,com. I can buy from them without fears of getting into any troubles with the feds, because they help to deliver to any address I give them.
ОтветитьI am unable to install tor, when i type apt-get install tor, it says "package 'tor' has no installation candidate", can anyone help me out of this problem.? Thank you.
ОтветитьSo basically this is same as using a tor browser ?
ОтветитьYou are the best teacher for a hacking
ОтветитьCCTV view from phone or PC how ?
ОтветитьLuv ya work mate ur a legend !! Cheers 😎👍👍
Ответитьgreat thanks
ОтветитьThe complete deep web course 2018. >>> Accept my invitation and give me discount
ОтветитьI LOVE this. Thanks so much! This explained alot. Not I'm finding your video to change DNS thanks :)
ОтветитьThanks bro. Please make a video about bridges.
ОтветитьHow to check my phone is hacked air not?
ОтветитьDammmit...... Don't ever use Tor..... Solution : Virtual Machine + VPN (Mullvad) + Wireguard + Whonix...... It's the setup of US Cyber command included UK too..... Warning : laptop must be bought in the dark market without fingerprint ( credit card etc.....) and No need to change Mac address because it's a Stealth computer....
ОтветитьThis is not illegal sir in any country using dark web in tor
ОтветитьHi HackerSploit, I was wondering if you could help me with a question, the laptop i just recently purchased to run tails and go on TOR has a wifi card that is not compatible with tails apparently and therefore I cannot connect to wifi (internet) on it. I was thinking about buying a wifi adapter to fix this issue. The only problem is that wifi adapters come with their own MAC addresses I'm pretty sure if I'm not mistaken. Since tails spoofs my mac address on my laptop would it automatically spoof the wifi adapters MAC address as well or just my laptop and create a fatal flaw in the security/privacy of tails defeating the purpose in using it allowing someone to find my geo location? If it does would I be able to manually change the wifi adapters MAC address and then return stability to the security/privacy of tails?
Thanks in advance your videos are insanely helpful, big fan.
Qubes running Whonix as a VM. If you really need to be a non-Qubes user, using Kali for example, you should still be connecting to a VPN via Tor.
ОтветитьHey, Hackersploit, what do you think about these custom built routers with VPN on the router. They get mixed reviews. Also, if I have a VPN-router and on my machine I’m running Kali and proxychains would that work? Would it basically just be like VPN over proxy ?
Ответитьwould TOR alone be enough to use with KODI or would you still need a vpn...... A bit random I know.... just curious
ОтветитьSo what kinda usage you would use tor for???
ОтветитьSo tor is kinda like blockchain
ОтветитьTo anyone that uses a VPN to connect to Tor, you must use a TCP VPN, Tor cannot send UDP packets so if your VPN is UDP, you are not hiding your Tor usage at all!
ОтветитьMore podcasts! Oh and it's Tor not TOR! There is also a cool open source application called SelekTor that routes all of your traffic through Tor and has a bunch of other features as well, it's also great for beginners that aren't good with the CLI.
Ответитьkeep up the good work.
ОтветитьPeace and love hackersploit
ОтветитьVideo title: How to run tor through command line. Video description: how to access tor through command line. Video content: how to start tor in command line, and access it via firefox.
Bro, I like your videos but this was some serious mislabeling and clickbait. At no point in this video did you show how to actually use tor to anonymize shell programs.
hint: proxychains is one way to pass commands through tor.
thank you bro
ОтветитьThank you ❤️. I have a question, nipe does similar stuff, right ?
ОтветитьYour videos are top notch and set realistic expectations from the tools showcased from a cybersecurity perspective
Ответить