Комментарии:
is this as effective as anonsurf
Ответитьis this secure ?
ОтветитьWhat is better nipe or anonsurf?
ОтветитьI feel like as I discover more and more different "anonymize system" videos in this channel, I don't know which one to use anymore
Ответитьthe best
Ответитьthank you so much still works in 2020 march
ОтветитьGreat video!! Can you explain in another video how to secure all traffic of network? like a server thats send all traffic of network across Tor
ОтветитьAwesome... fast & simple & worked the first time!
ОтветитьHow to forward port after anonymusing
Ответить@HackerSploit this nipe is not working on 2020 kindly share us a new method.
ОтветитьBest video 👏🤘
ОтветитьBut....how it is possible when i go to site whatsmyip or other...she wrote to me...i was there more than 5times sorry...i restart my ip, restart my pc and she know i was there...what id this ? 🤔
ОтветитьI had a error: sorry, it was not possible to establish a connection to the serve.. could anyone help me?
Ответитьwhatas the difference between this and anonsurf?
ОтветитьCan you do this with a vm?
ОтветитьWhich is better whonix or nipe?
Ответитьhello , wich is the best solution for complete anonymity , anonsurf or nipe ??
ОтветитьPerhaps iptables or your kernel needs to be upgraded.
iptables v1.8.4 (legacy): can't initialize iptables table `filter': Permission denied (you must be root)
How to fix this
bro wich is the best tool to be fully anonymous ?? anonurf , nipe , or whoniex ??
ОтветитьInstallation fails at line 5 and 8. Did I install the wrong cpan?
ОтветитьOnly the IPV4 is spoofed, IPV6 still visible. Are there any workarounds
ОтветитьWtf just use whonix. Its much better. And the probability of ip leaks is also much less
ОтветитьIyf... Nobody is safe because nothing is impossible to see
ОтветитьHey buddy is anonsurf safe or nipe script is safe which you just showed and cannot be traced because I have anonsurf installed on my system, so what should i use? Hope you reply soon
Ответитьcheers @HackerSploit Thank you, for the video i really appreciate it im actually so surprised it worked, i ran so many different tools to see my ip and its all changed, im surprised it actually worked, but yea im just learning idk i guess i call it, im learning Cyber Security, of how everything works and protection, then im learning some things ethical hacking does, i dont wanna break any laws but im just working out Kali Linux, but thanks HackerSploit.
ОтветитьI just activated as you showed, after that tried to access shodan using Tor but it says access denied 1020,(I am a beginner) how to solve it?
ОтветитьHow does it work at termux?
ОтветитьSo better than anonsurf , better competitor to proxychains 🌚
ОтветитьI use Tor browser, ProtonVPN,ProtonMail and a rooted computer. Linux and windows OS.
ОтветитьIs This Better Than VPN ?
ОтветитьThanks
Ответитьis surf shark good it is rated at no 1
ОтветитьDo i need to enable tor manually or will it do it by itself
ОтветитьIs there any way to use proxy Chain on iPhone ???
ОтветитьNice 👍
ОтветитьThanks for your support ❤️
ОтветитьSir I am run this comand
sudo cpan install Try::Tiny Config::Simple JSON
After running this command my wifi network can't show pls solve this problem
it's not safe! don't show the wrong way plz.
ОтветитьIm trying to install this on Arch Linux ( I already did on my Kali Machine )
but this command gives me an error : "sudo cpan install Try::Tiny Config::Simple JSON"
sudo: cpan: command not found
CAnt find any info about cpan on Google.
Is this actually?
Ответитьamazing af!!
ОтветитьThanks HackerSploit. Seems better than setting up WHONIX.
ОтветитьLove it thank you
ОтветитьI think anonsurf is also decent option. And already installed in parrot os ! And to get maximum security use live boot tails os + custom bridges + anonsurf or nipe
I think this is sufficient for surfing tor.
I would not do this, fully automatize all the functions of your system... Ok if you think that this will protect you forever, you are god damn fool... Your ip has to communicate with external proxy server, that switching is probably worse then sustaining on your ip address of the router, m8 if you keep switching from your router to another one constantly and leaving those logs of information everytime you login or swap some account somewhere else, there is gonna be likely higher chance of you getting hacked because of that, someone will get external logs from the proxy server, or gonna get syscall and somehow get inside the proxy tunneling and will be able to just get logs of you and your ip, or you will just be unlucky and download corrupter file or program for unmarked exploit and someone will hack you, no matter how much you want to be anonymised, even bigger point for hacker to hack you cuz trust me i can get involved into this rabbit hole deep down someone will see the communication and it will be much more essencial for him to gain information about you, more then if you just stayed within your router external ip. And believe it or not, all the ip addresses are public, someone will scan for range of ip address and if he will find unsecured router login information just plain text no shit he gonna hack you LOL
ОтветитьLol tor dns leakage is a thing. Your isp might not see your actual traffic, but they will know what sites you are visiting overall
Ответитьhow do you start nipe with a script?
ОтветитьGood morning to you Channel admin..,i am newbie to your channel.....here is what i got--- sh: 1: tor: not found
Failed to start tor.service: Unit tor.service not found.
iptables v1.8.9 (nf_tables): owner: Bad value for "--uid-owner" option: "debian-tor"
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.9 (nf_tables): owner: Bad value for "--uid-owner" option: "debian-tor"
Try `iptables -h' or 'iptables --help' for more information.