OK. So, you’ve downloaded Tor Browser and a random free VPN you found on Google. Think your private information and browsing is anonymous? WRONG. You are about to expose yourself. Just because someone on Reddit told you this setup was safe, doesn’t make it true. This is probably the easiest way to get tracked. Why? It’s simple.
Everything you do on the Internet goes through your ISP (aka Internet Service Provider), this includes anything you do outside of the Tor browser as well. Our Zero Trace Pen encrypts and anonymizes your entire connection by passing it through 3 different relays just like the Tor Browser. However, encryption happens at the operating system level. This means, you can browse applications and the internet completely anonymous without worrying about being tracked.
Q – Why not just use regular Tor Browser on a Windows or macOS PC and be extra careful?
A – They can easily track MAC addresses with a click of an NSA button.
In order to find a laptop by the MAC address of the network adapter, they need to contact the law enforcement authorities. They will be able to search for it after they sign a release allowing your laptop to be traced via their honeypot WiFi networks.
Everything you do from within the Zero Trace Pen is FORCED via 3 Tor relays. This means if you accidentally click outside the Tor Browser and open another app – you will be completely safe and anonymized.
The Zero Trace Pen randomly assigns your PC a new MAC address every time you use it. Organizations running honeypot networks will not be able to identify you.
The Zero Trace Pen prevents others from spying on your internet activities and learning what you are doing online. By using the Zero Trace Pen you prevent any website you visit, from learning where and who you are.
Absolutely everything you do from within the Zero Trace Pen is FORCED via the Tor network. This includes all pre-installed applications as well.
You will be able to manage a social media account entirely through the Zero Trace Pen. If you only access them from the pen, they cannot be traced to you. You will also be able to store documents and images related to your different identities all via the preinstalled applications. Keep your passwords in KeePassXC and have a dedicated email account in Thunderbird, etc.
By nature, the Zero Trace Pen always boots up from the same clean state and everything you do disappears automatically the second you shut it down. We have also implemented emergency purging protocols that are triggered by removing the pen from your computer. This means, regardless of what you’re doing, you can easily just pull out the flash drive and your PC will automatically start erasing all your activities and make them completely inaccessible.
Sometimes LIVE USBs may not shut down properly on older PC models, this leaves you vulnerable to cyber attacks.
Optionally, you can save some of your files and configuration on a secure storage folder on the USB stick: your documents, your browser bookmarks, your emails, and even some additional software. Everything will be encrypted using VERACRYPT technology.
To use the Zero Trace Pen, we recommend you shut down any computer and boot up the Zero Trace Pen instead of starting Windows or macOS. You can turn any computer into a secure anonymous machine before you start handling business matters.
Finished using the Zero Trace Pen? Unplug it and use the computer like normal, there won’t be any evidence of whatever you were researching prior.
Best of all, you don’t have to worry about catching viruses, because the Zero Trace Pen runs independently from your regular operating system and never uses the hard drive. In fact, you can use the Zero Trace Pen on a computer that has it’s hard drive completely removed!
The Zero Trace Pen includes premium applications to open sensitive documents,
communicate securely & perform penetration testing.
The Electrum wallet will come incredibly handy when conducting business with cryptocurrency. Due to the fact that Electrum is running on the Zero Trace drive, it means all connections are sent via the Tor Network. This means your transactions will remain private.
Thunderbird is a program that offers a range of privacy options for all of your email needs. You can use it to login to almost any of the popular email providers with complete anonymity. Thanks to Zero Trace, all of Thunderbird’s activity will be sent through the Tor Network.
LibreOffice is a Microsoft Office compatible suite of apps for creating and opening text documents, spreadsheets, and presentations. This is a great tool if you plan on downloading and viewing eBooks, guides, tutorials, and other sensitive documents.
Pidgin is a program that lets you log in to your accounts from multiple chat apps. Due to the fact that many Fortune 500 companies, activists, and military personnel prefer to communicate via ICQ, IRC, and XMPP, this app will help you chat with whomever you need to privately and anonymously.
When starting the Zero Trace Pen, you can choose between a large number of languages including:
Arabic – Azerbaijani – Catalan – Czech – Welsh – Danish – German – Greek – English – Spanish – Persian – Italian – Japanese – Khmer – Korean -Latvian – Bokmal – Dutch – Polish – Portuguese – Russian – Slovak – Slovene – Albanian – Serbian – Swedish – Turkish – Ukrainian – Chinese
Additionally, each language setting comes with it’s own corresponding layout!
Zero Trace Works On Any Computer