QUICKIES
Ain't Nobody Got Time For This ShitWhat's Inside?
- ✓ You already know - you've seen it
- ✓ If you don't, fuck off - why are you here?
- ✓ Freebies - available on private network
You Are Already Safe!
- ✓ No need for this - but we give you choices
- ✓ Disposable Browser - Beacon - DIY
- ✓ We make you safe - but watch your feels
Payment Options
- ✓ Crypto only on-site - Talk to admin
- ✓ 66.6 usd for a month - 666 for a year
- ✓ 6.66 for an hour - meant as preview
Cryptocurrencies
- ✓ Bitcoin - easiest to get i.e. coinbase.com
- ✓ Litecoin - cheaper, faster and just as available
- ✓ Monero - for ultimate privacy
Monero How-To Guide
- ✓ Atomic Wallet - our recommendation for ease
- ✓ Send Bitcoin to it - simply swap to Monero
- ✓ Cuts the traces - and now you pay with it
Private Network
- ✓ ZeroTier One - Download and install
- ✓ Public Network - 12d650c0ce665404
- ✓ It's open source - You can read all about it
Extra Security For Paranoids
- ✓ These are complex - click to read more
- ✓ Disposable Browser - Scripts - Visualizer
- ✓ Tor Link - not recommended
Free Stuff
- ✓ Telegram group - join now
- ✓ NastPdos - Telegram, but better
- ✓ Perv Rooms - check out available rooms
Need Help?
- ✓ SimpleX - contact us anonymously
- ✓ Signal - or even on Session
- ✓ Telegram Bot - for automated help
Network Security
This is a guide to make security as easy and as comprehensive as possible for both the reckless and the paranoid. You don't have the time for this nor do you really care. You like Zelda? Everybody likes Zelda. Think of this as the Triforce of being safe:
DNS IP ENCRYPTION
This page is automatically testing your setup and makes the corresponding letter green when secured. Know that YOU DO NOT NEED TO DO ANY OF THIS. Our site is client-side end-to-end encrypted tunneled via a proxy that is also encrypted, which is why the letter E is already green. In "normal standards," this is already overkill, but we ain't your pappa and can't tell you which standards to hold.
We can only facilitate the infrastructure for you to reach the closest you can get to perfect OpSec and cannot secure your device on our own; you need to do that yourself. Know this process could be a walk in the park or a walk of shame into Hell, depending on your willingness to trust us and the complexity of your device's networking infrastructure. As soon as all three letters are green, you are good to go.
Quick Start Guide
This is for reference only, you will not understand just by staring at it. Read.
Quick Setup CommandsAutoset-up (click to copy):
Run on PowerShell, Terminal, or Bash respectively. |
Disposable Browser: |
Disposable Browser
Our disposable browser is designed to leave no traces of your activity after use. It routes all traffic through secure tunnels and comes with built-in security features.
No History
Leaves no browsing history, cookies, or cache when closed
No Tracking
Blocks common tracking scripts and fingerprinting techniques
Secure Connections
Forces HTTPS connections whenever possible
Download
Security Scripts
Our security scripts automate various hardening measures for your system. They can enhance your privacy by configuring system settings that are typically difficult to access.
⚠️ Warning
These scripts require administrative privileges to run. Always review any script before execution. We provide the source code for transparency.
Available Scripts
- DNS Secure Config - Configures your system to use encrypted DNS
- Network Hardening - Adjusts network settings for enhanced privacy
- Full Security Suite - Comprehensive security setup (DNS, IP, Encryption)
Security Visualizer
The Security Visualizer provides a real-time overview of your security posture, showing which protections are active and helping you understand potential vulnerabilities.
Connection Security
- TLS Encryption Status
- DNS-over-HTTPS Detection
- Certificate Validity
Network Privacy
- Private Network Status
- VPN Detection
- Proxy Usage
Identity Protection
- Browser Fingerprint Status
- Cookie Management
- Tracking Prevention
⚠️ Importance of Visualization
The Security Visualizer helps you understand complex security concepts at a glance. Green indicators show strong protection, while yellow or red indicators highlight areas that need attention.
Regular checks using the visualizer can help you maintain optimal security settings.
Your Personal Information
Here is an exact example of the information we keep of you on our servers. Keep in mind this is only kept in RAM and not on disk nor on any kind of database, so it is ephimeral and gets deleted when the system is not running.
* Upon making a payment, we will suggest you a username and a password, which you can change to your desired credentials. We suggest to use the recommended username and password in order not to be traced back through common usernames across platforms, and not to expose an existing password that could be used to gain access to another account of yours elsewhere.
** This value does not represent your actual card information, but it can merely be one of three values: "Debit/Credit Card", "Cryptocurrency", or "Sponsorship". This is only used for our own financial references.
*** The actual time is ommitted in order to prevent backtracking based on time records, unless paying for an hour of access.
**** This ID is for the software used to run a given service like the Porn Vault, or the Single Sign-On, and does not refer to any ID that could be potentially cross referenced in any external document.
***** This 'Member' tag is only used to make sure our Single Sign-On system has the correct permissions set for your account, and does not mean that it keeps track of your account once you are not a member anymore. Upong losing your member status, your account is deleted for the Single Sign-On and for the Porn Vault as well if set to Amnesic Mode. Otherwise, the Porn Vault account is only disabled in order to maintain your Favorites/Collections intact.
You got three options, the first two being a single-click automated solutions and the third being a manual set-up and a fallback in case for some reason one of the first two doesn't quite work on your system.
Option 1: PowerShell Script
This automatically sets everything up on your computer. This is the easiest and faster option, but you should never ever do this unless you trust the script you are running. If you know anything about coding, you can simply read the script for yourself as it is extremely simple, we got nothing to hide. But do know this will ask for your password and having that, it could do anything to your computer. There's three reasons to choose this option: you either really, really trust us, you read the script beforehand, or you are plain stupid.
Option 2: Disposable Browser
This is an app that has all you need to be secure integrated as a standalone sandboxed application. This is the safest and most reasonable option. This will not require a password, hence cannot harm your system. Best of all, it is designed to be a single file to be deleted once you are done leaving nothing behind. Downside is it's on beta and many things may prevent it from working properly for which we cannot offer any help. If this doesn't work for you, you will need to try another option, or try again at a later version.
Option 3: Manual Set-up
This guides you through the process of installing all the necessary components to be as safe as using any of the previous options. We do not explain further at this point in order not to overwhelm users who simply want to get it over with and move on, but we do in choosing this option.
Choose which to pursue:
ZeroTier One For IP
For the letter "I", you would need to install ZeroTier One, a layer-three network adapter that allows you to connect to our private network. This software is open source so you can know exactly what it does by reading the official documentation on GitHub.
Then you need to join network ##########.
DNS-over-HTTPS For DNS
For the letter "D", you would need not to use your default ISP's DNS server. This can be achieved in many different ways from the simple to the intrusive. Here are your options:
Option 1: Add IP Resolution To Your /etc/hosts File
Explain this works at the system level and bla bla, then follow the same format as before, same with next options.
Option 2: Add A DNS Server At System Level
Same, explain and tell id would affect all the traffic on the computer, potentially making it lose the internet connection. That they only would need to set it back as it was if that happens, etc.
Option 3: Use DoH At The Browser Level
Same... and so on, going into mobile and everything else. You get it.
Script Execution
Running the script will automate the setup process by configuring DNS, IP settings, and encryption protocols on your system.
Script Details
The script provided automates the setup process by configuring DNS, IP settings, and encryption protocols. It requires administrative privileges to execute necessary system changes securely.
Before running the script, please review its contents to ensure it meets your security standards. You can access the script here.
Disposable Browser Details
The Disposable Browser is a sandboxed application designed to provide a secure browsing environment. It isolates your browsing activity, ensuring that no data is stored once the application is closed.
Features include:
- End-to-end encryption
- Automatic deletion of browsing history and cache upon exit
- Protection against malware and tracking scripts
What is ZeroTier?
ZeroTier is a software-defined networking solution that creates virtual networks spanning multiple devices and locations. It simplifies network configuration and enhances security by providing encrypted connections.
Benefits include:
- Secure, encrypted connections
- Easy setup and management
- Flexible network configurations
- Cross-platform support
Joining the Network
To join the network ##########, follow these steps:
- Open ZeroTier One.
- Click on "Join Network."
- Enter the network ID: ##########.
- Click "Join" and wait for approval.
If you encounter issues, refer to the ZeroTier Documentation or contact support.
/etc/hosts Configuration
To add IP resolution to your /etc/hosts file, follow these steps:
- Open the Terminal application.
- Enter the command:
sudo nano /etc/hosts
. - Enter your administrative password when prompted.
- Add the following lines to map hostnames to IP addresses:
- Press
Ctrl + O
to save the file, thenCtrl + X
to exit. - Flush your DNS cache using the command appropriate for your OS.
127.0.0.1 localhost 192.168.1.1 mysecuredns.com
System-Level DNS Configuration
To add a DNS server at the system level, follow these steps:
- Open the Network Settings on your device.
- Select your active network connection and click "Properties."
- Scroll to the DNS section and click "Edit."
- Replace existing DNS servers with your preferred secure DNS servers, such as:
- 8.8.8.8
- 8.8.4.4
- Save the changes and restart your network connection.
MONERO PAYMENT GUIDE
1. Buy Bitcoin
Purchase Bitcoin from any exchange that accepts credit cards (Coinbase, Binance, etc.)
2. Download AtomicWallet
Get AtomicWallet.io app on your device
3. Send Bitcoin to AtomicWallet
Copy your BTC address from AtomicWallet and withdraw your Bitcoin to it
4. Swap BTC for XMR in AtomicWallet
Use the built-in exchange function to convert Bitcoin to Monero
5. Pay with Monero
Click "Buy Access" button, copy the provided Monero address, and send the exact amount from AtomicWallet
Why Monero?
Monero transactions are private, secure, and cannot be traced back to you.
DNS over HTTPS (DoH) Configuration
To configure DoH at the browser level, follow these steps based on your browser:
Firefox:
- Open Firefox and go to "Preferences."
- Scroll down to "Network Settings" and click "Settings."
- Enable "Enable DNS over HTTPS."
- Select a provider or enter a custom provider URL.
- Click "OK" to save the settings.
Chrome:
- Open Chrome and go to "Settings."
- Scroll down to "Privacy and security" and click "Security."
- Under "Advanced," enable "Use secure DNS."
- Select a provider or enter a custom provider URL.
- Restart Chrome to apply the changes.