anonymity

Russian Manual for Anonymity

Section 1 security and anonymity settings: remove all Russian applications. Everyone is talking about the drains of Google and Microsoft, but these are pendos, and the hand of Russian security forces will come closer to a Russian person. VKontakte - collects complete information about you, tracks your actions and movements, all correspondence - are stored, and when deleting a message I will reveal a secret, you do not delete them from VKontakte, it just appears…

Read More

“Anonymous”, launches a new cryptocurrency

"Anonymous", launched a new cryptocurrency under the name "Anon Inu", and this move came, according to them, to fight Elon Musk as well as the war declared by China over cryptocurrencies.Anon Inu https://anoninu.com/ The lustrous ANON INU has arrived to Binance Smart Chain (BSC). INU was mistreated his whole life and has finally found a loving place to stay he calls home. ANON INU's goal is to keep his holders happy by being a Defi…

Read More

Cyber Battalion Empowerment Courses in Abali – Iranian Basij Cyber Battalions

Iranian observers review of Basij Cyber Training ranging from cyber personas, denial and deception, hard core hacking, impersonation of groups associated with Reza Pahlavi and associated groups, trolling, and infiltration of American organizations.

Read More

Cybercrime (hiding activities in cyberspace) more #Iranian training

Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc. for your own purposes (offensive or defensive) without leaving any trace behind you and no one being able to identify the activities you have done. Prerequisites for this course Before attending this course, the student is required to have a basic understanding of basic networking concepts such as information transmission,…

Read More