How 2 Use
What you'll get:
A "hidden service" on TOR. You can use a TOR browser (download for free from http://torproject.org), or for higher security, a password protected bootable USB drive running TAILS software. By default all traffic on a TAILS installation goes to the TOR network as long as you follow some guidelines.
A "hidden service" on TOR. You can use a TOR browser (download for free from http://torproject.org), or for higher security, a password protected bootable USB drive running TAILS software. By default all traffic on a TAILS installation goes to the TOR network as long as you follow some guidelines.
Change Your Habits
To make the most effective use of a private document and photo repository, it is essential to change your lazy, sloppy habits. Putting your private repository address on Facebook and Twitter, makes it public. Even if you accidentally leak the information, however, user accounts and passwords, or if desired, 2 Factor Authentication can be set up so all of that has to be compromised as well for an attacker to get your information.
To make the most effective use of a private document and photo repository, it is essential to change your lazy, sloppy habits. Putting your private repository address on Facebook and Twitter, makes it public. Even if you accidentally leak the information, however, user accounts and passwords, or if desired, 2 Factor Authentication can be set up so all of that has to be compromised as well for an attacker to get your information.