From Hidden Wiki
Jump to navigation Jump to search

Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. If you want to browse darknet, you should make sure some security measures in your mind.


Security provides a form of protection where a separation is created between the assets and the threat. These separations are generically called controls, and sometimes include changes to the asset or the threat.

Perceived security compared to real security

Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former. Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection.

Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted Passenger Prescreening System to have created a decrease in objective security.

Perception of security can increase objective security when it affects or deters malicious behavior, as with visual signs of security protections, such as video surveillance, alarm systems in a home, or an anti-theft system in a car such as a vehicle tracking system or warning sign. Since some intruders will decide not to attempt to break into such areas or vehicles, there can actually be less damage to windows in addition to protection of valuable objects inside. Without such advertisement, an intruder might, for example, approach a car, break the window, and then flee in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren't stolen, but with perceived security even the windows of the car have a lower chance of being damaged.

Essential security measures

  1. You shouldn't ask and answer private information.
  2. Using NoScript.
  3. Encrypting your computer, smartphone, and tablet computer. Encryption conceals your traces in hard disk drives and flash memories. -> VeraCrypt for example

Recommended softwares and apps



  • I2PSnark: I2P's build-in BitTorrent similar software. It's not compatible with the traditional BitTorrent.


GPG encryption

Data security

Operating systems

Your operating system the most important layer in your security model. You should try to test and evaluate all OS's to find that perfect match between security and usability.



  • Tails: Tails serves as a pre-configured out-of-box secure OS which can be easily loaded onto removable media. Its ease of use while still forcing a secure protocol makes this OS a great contender. It's based on Debian. All its outgoing connections are forced to go through Tor, and non-anonymous connections are blocked.
  • Whonix: As with Tails, Whonix forces all communication through the Tor network. However, Whonix uses VirtualBox to usd a VM to ensure isolation of the user from the network. As such, it is a little more complex to setup and maintain. Nonetheless, Whonix serves as a viable alternative to the Tails OS for any user who wishes to keep a persistent OS on disk. It's based on Debian.

  • Kali Linux: While not geared towards being out of the box secure, Kali is a powerful tool to exploit network vulnerabilities. This OS comes prepackaged with tools to collect and analyze data in your network as well as having software for anti-forensics. If you have ever wanted to know how secure your system/network is - bombard it with Kali. Kali Linux is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards.

Red Hat


Virtual machines

  • VirtualBox: Open source, free as in beer, and compatible with all major OS's there is no doubt that VirtualBox holds the number one spot in consumer VM's. Its robustness and maturity makes it the go to choice for any one who wishes to host a different OS virtually.

VMware Workstation Player is a free to use VM suite that allows you to host any OS on top of your Windows or Linux machine.

VMware Fusion claims flawless integration with your macOS machine and will allow you to host any OS on top.

Antivirus softwares

See also