Darknet Extreme Virtual Machine 128GB (SD Card) ~ 2 months old -- Ships From United States

2.81554179 BTC
$350.00 USD


Preview of available shipping methods:


Item Description:
Version 3.0

• Cross platform virtual machine for the free open source VirtualBox hypervisor that can be run on Linux, Mac OS X, and Windows operating systems.

• Full featured, easy-to-use Ubuntu Desktop 13.04 (Linux) operating system with full disk encryption, Mozilla Firefox browser, Thunderbird with Enigmail installed for pgp secured email communications. (The Darknet Extreme Virtual Machine is offered in a 32-bit or 64-bit system configuration. Please specify the desired configuration when placing your order).

• Enables anonymous activity with the installed I2P (Invisible Internet Project) and Tor Browser Bundle open source software packages.

• Powerful open source encryption technology (TrueCrypt and GNUPG).

• Plausible deniability– the Darknet virtual machine resides in a hidden, encrypted TrueCrypt container (with an exfat file system) which is itself enclosed in an encrypted outer TrueCrypt container. If you don't require plausible deniability you can move the virtual hard drive outside the TrueCrypt container and eliminate the dependency on the TrueCrypt software. You will still have full disk encryption but will loose the plausible deniability feature.

• You can change the default TrueCrypt passwords to manage your own security policies. You can also change the Ubuntu full disk encryption passphrase.

• Extremely fast! – The package is installed on a SanDisk Extreme Secure Digital XC (SDXC) 128GB UHS-1 memory card that has speeds up to 45MB/s class 10.

Added bonus! Security and anonymity books in pdf format (in the Computer Forensics ebooks folder on the Linux Desktop):

- Anonymous Security Starter Handbook
- Beware the Dangers of Metadata
- Computational Forensics
- Computer-Aided Forensic Facial Comparison
- Computer and Intrusion Forensics
- Computer Forensics - A Pocket Guide
- Computer Forensics Computer Crime Scene Investigation
- Computer Forensics For Dummies
- Cyber Forensics
- Digital Forensics for Network Internet and Cloud Computing
- EnCase Computer Forensics
- Forensic Computer Crime Investigation
- Forensic Computing - A Practicioners Guide
- Hacking Exposed Computer Forensics
- Handbook of Computer Crime Investigation-Forensic Tools and Technology
- Handbook of Research on Computational Forensics Digital Crime and Investigation
-Incident Response and Computer Forensics
-Incident Response and Computer Forensics Toolkit
-OpenVPN-2 Cookbook
- Privacy Protection and Computer Forensics
- Scene of the Cybercrime Computer Forensics Handbook
- The Best Damn Cybercrime and Digital Forensics Book Period
- Virtualization for Security


This item has no feedback yet.