Your Current Tor Setup Is Dangerous
- Anything you do outside of Tor browser is unprotected and can expose your IP.
- Any file that gets downloaded, even without your knowledge - can and will expose your identity.
- Windows & macOS computers log all your activities for development purposes.
- Law enforcement can recover these logs and even any files you've deleted.
Zero Trace Pen
Zero Trace is an all-in-one stealth flash drive that comes with everything you need to surf the dark web. Being completely portable, you can start Zero Trace on any computer from the USB port.
How Is Zero Trace Different?Everything you do on the Internet from Zero Trace goes through the Tor network, this includes anything you do outside of the Tor browser as well. Zero Trace encrypts and anonymizes your connection by passing it through 3 different relays. Relays are servers operated by different people and organizations around the world. This means, you can browse the internet and dark web completely anonymous without worrying about being tracked. You can also visit sites that would usually be blocked on your work/school network.
How Does The Relay System Work?A single relay never knows both where the encrypted connection is coming from and where it is going to:
Zero Trace gives you access to more than 7,000 relays. Organizations running relays include universities like the MIT, activist groups like Riseup, nonprofits like Derechos Digitales, Internet hosting companies like Private Internet Access, etc. The huge diversity of people and organizations running relays makes it more secure and more sustainable.
Avoid Surveillance & Mask Your IdentityZero Trace prevents others from spying on your internet activities and learning what you are doing online. It also prevents any website you visit, from learning where and who you are.
Online trackers and advertisers won't be able to follow you around from one website to another anymore.
You could manage a social media account entirely through Zero Trace. If you only access it from the pen, it cannot be traced to you. You can store documents and images related to this different identity in your Secure Storage, keep your passwords in KeePassXC (included app), and have a dedicated email account in Thunderbird (another included app), etc.
Automatic File PurgingZero Trace always boots up from the same clean state and everything you do disappears automatically the second you shut it down. We have also implemented emergency purging protocols that are triggered by removing the pen from your computer. This means, regardless of what you're doing, you can easily just pull out the flash drive and your PC will automatically start erasing all your activities and make them completely inaccessible.
WITHOUT Zero Trace, almost everything you do leaves traces on the computer:
- Websites that you visited, even in private mode
- Files that you opened, even if you deleted them
- Passwords, even if you use a password manager
- All the devices and Wi-Fi networks that you used
Carry A Secure Computer AnywhereTo use Zero Trace, shut down any computer and boot up Zero Trace instead of starting Windows, macOS, or Linux. Turn your own computer into a secure anonymous machine or stay safe while using someone else's computer. You don't even need their password.
Finished using Zero Trace? Unplug it and use the computer like normal, there won't be any evidence of whatever you did prior.
Best of all, you don't have to worry about catching viruses on the dark web, because Zero Trace runs independently from your regular operating system and never uses the hard drive. In fact, you can run Zero Trace on a computer that has it's hard drive removed!
Digital Security Toolbox
Zero Trace includes premium applications to open sensitive documents,
communicate securely & perform penetration testing.
The Electrum wallet will come incredibly handy when conducting business on the dark web, as most dark web sites only accept cryptocurrency as payment. Due to the fact that Electrum is running on the Zero Trace drive, it means all connections are sent via the Tor Network. (Learn More)
Thunderbird is a program that offers a range of privacy options for all of your email needs. You can use it to login to almost any of the popular email providers with complete anonymity. Thanks to Zero Trace, all of Thunderbird's activity will be sent through the Tor Network. (Learn More)
Hack Any WiFi PasswordWe have incorporated one of the most popular network auditing tools into Zero Trace. With this tool you will be able to crack any WiFi password with ease. Need to test the security of public/private WiFi networks - on the road? We got you covered.
- Applications are blocked automatically if they try to connect to the Internet without Tor.
- Everything in the Secure Storage is encrypted automatically.
- Zero Trace does not write anything to the hard drive. All the memory is deleted automatically when shutting down.
Secure StorageYou can save some of your files and configuration in an encrypted Secure Storage on the pen: your data, your browser bookmarks, your emails, and the additional addon software we provide via the VIP Portal.
The Secure Storage is optional and you can always decide what gets saved. Everything outside of this folder is erased every time you unplug.
When starting Zero Trace, you can choose between a large number of languages including:
Arabic - Azerbaijani - Catalan - Czech - Welsh - Danish - German - Greek - English - Spanish - Persian - Finnish - French - Croatian - Hungarian - Indonesian - Italian - Japanese - Khmer - Korean - Latvian - Bokmål - Dutch - Polish - Portuguese - Russian - Slovak - Slovene - Albanian - Serbian - Swedish - Turkish - Ukrainian - Chinese
Additionally, each language setting comes with it's own corresponding keyboard layout!
We keep things very simple. No frills or bloatware for maximum speeds and security.
- Online support with a direct SMS hotline for questions and help with setup.
- Access to members only area with video tutorials and exclusive content.
- Access to newsletter and SMS broadcast with the latest dark web news and online privacy updates.
- Receive all future software updates for life - directly on your drive.
- Access to all future guides and tutorials created by the team.
- And much more!!!
Buyer's GuideA detailed guide on how to make purchases off the darknet safely and anonymously.
Vendor's GuideAn essential guide for vendor's who wish to stay in business and avoid bringing unwanted attention in the long run.
Carder's GuideAn extra guide for entrepreneurs who are seeking to understand how others profit from credit cards via the darknet.
Your activities on Zero Trace are far more encrypted and untraceable, than the traditional mainstream ways of hiding your online identity.
Here are some common misconceptions about Internet privacy:
Private Browsing does not mask your identity or activity online. Websites can still gather information about your visit, even if you are not signed in, and so can internet service providers. If you use your device at work your company may be able to monitor the websites you visit. Or, if you surf the web at home, your cable company or their partners may have access to your browsing information.
The truth is that if you do something heinous enough on the net, someone will want to get you badly enough that no VPN is going to stop them. With enough pressure, even the VPN providers will cooperate in some cases. Therefore, a VPN is not a license to forget the difference between right and wrong.
Like we said before, just because you are using a VPN DOES NOT mean you are anonymous. While combining a VPN with Tor browser will definitely increase your privacy, this doesn't mean you aren't identifiable. Anything you do outside of the browser will identify you and put you at risk of being traced. Emails, IM chats or any downloaded files especially PDFs - usually connect to the internet in order to load certain elements (e.g. images). Even if these files were downloaded via the Tor browser, once opened in another program these files WILL leak your IP address and other identifying information.
Many people think that deleting a file will completely remove it from your PC. However, this is not the case. Deleting a file is similar to removing the front path to a house. The house and its contents are still there, but you can’t walk through the front path to get there. When a file is deleted, you are only removing the easiest way to get to the data. This means LE (Law Enforcement) can access and recover a “deleted” file. Whether it may be emails, chats, photos, documents, passwords, crypto wallets, or other personal data; they will find it all. You can easily avoid all this with Zero Trace, as it will not leave a single file on your PC.
Bitcoin is not anonymous; it is pseudonymous. Every bitcoin owner has an address associated with a public key and a private key. If the public key can be associated with your personal identity, it doesn’t remain anonymous. For example, when you purchase bitcoin with a popular app like Coinbase, they will ask you to provide a photo of your ID and SSN number. We DO NOT RECOMMEND you use these coins with any questionable websites or markets as this will easily be traced back to you. Even if you manage to buy bitcoin with out identity verification, your IP and MAC address will de-anonymize you and land you back in the same boat. Zero Trace fixes all this by providing you an Electrum bitcoin wallet that only connects to the internet via the Tor network and spoofed MAC address, thus providing you true anonymity.