_____________________________________________________________________

The price for this tool is $199 USD. After making the payment leave the page open until Bitcoin receives all the confirmations and and the payment is confirmed. It might take 10, 15 minutes but after the payment is confirmed the page will redirect you to the download link automatically. If you have issues contact me via email or jabber!

_____________________________________________________________________

Introduction:

Linken Sphere – a professional browser that will change your perception of the security and convenience of working on the Web.
This browser is developed in order to all the latest identification technologies used to deanonymize website visitors, as well as understanding user needs.

It allows you to work in a multithreaded mode, using the possible advantages of various types of connections or a combination of them. With the full or partial use of security technologies and replacing delivered information, including geolocation services. The functionality of this software also allow you to take full advantage of multisessions and import/export cookies.

Because of the existence of a tab without special settings the browser can be used as a normal surfing tool. We did our best to ensure that the presented product to be fast, convenient and intuitive. The browser was developed in order to save users from the need to use additional software and add-ons.

With proper use, this product can guarantee 100% safety and anonymity. It is strongly recommended you to carefully read this manual in order to fully benefit from its use.

Installation:

The software product is provided as an installer, which can be installed on a local or remote computer, as well as a virtual machine (VMWare or VirtualBox).
Minimum requirements:
2xCore 1.7GHz, 2Gb RAM

Supported versions for system installation (including virtual machines):
– Windows 7/8/10 x64 SP1
– MacOS not lower than Yosemite
– Linux (x64): Ubuntu, Linux Mint, Kali Linux, Gentoo (Calculate Linux), Fedora, Debian, OpenSUSE, Slackware, Mageia, PCLinux, Kubuntu

Minimum system requirements are not specified, but software performance, including the number of active tabs depends on the computer’s power or allocated resources of the virtual machine.

Basic capabilities:


After passing the authorization, you will see the main window for creating sessions. In this state, by default, the base tab is opened. This mode is suitable for normal surfing because it doesn’t use protection mechanisms and records cookies in the normal mode (one cookies for all open windows). In fact, this is the usual browser that uses a basic connection to the Internet. without anonymization. Basic opportunities are represented by the following items:

1) Search string. There you can enter both the name of the site and the search query. The search engine that is used for search is duckduckgo. This search engine is an open project, also used in Tor Browser due to the lack of logging of search queries. You can change the search engine in the basic settings of the browser.

Please note that the browser has built-in security check function for connection – in case the connection uses https and is safe, the background color of the line will be yellow. In the case if the security certificate is missing or is doubtful, the line will retain transparency.

2) The name of the tab. By default it’s a default session

3) Button for creating a new tab. Each new tab is a default session clone, and uses a basic Internet connection.

4) History navigation button. Allows you not just to navigate between viewed pages back and forward, but also to select the necessary links from the drop-down list.

5) Refresh page button. When the page loads, it changes it’s value to “stop”

6) Bookmark button. You can add the necessary pages to the bookmark to use it fast later.

7) Button to create a session. Allows you to create, copy or delete a new session with the specified name.

8) TOR button. Allows you to get a new identity, restart the TOR configuration or show the current connection chain.

9) Paste like human print (also CTRL+B) – This function is designed to speed up the work with the use of copying without attracting the attention of antifraud systems. The built-in mechanism performs insertion from the buffer using random delays between inputs, thereby repeating the usual human input.

Work with session:

After clicking on the button for creating a personal session a window opens and allows you to configure the current personal session using a lot of additional parameters. To start you need to open a session from the saved, or create a new one.

1) Select an existing session from the drop-down list (sessions are saved in the order they were added, navigation by the first letter of the session name is possible)

2) New session. In order to create a new session, you must enter it’s name in this field

3) Notes window – allows you to create your own comment to the session, which can be edited directly during work (contect menu on the session tab -> session info)

4) set color button – allows you to use the color palette to indicate the color of the session. This greatly simplifies the visual perception of the parent and child tabs and, accordingly, your work.

5) clone settings button – allows you to create a full copy of the session, including prints (optional)

6) Кнопка change name button. To rename a session, select it from the drop-down list, click this button and enter a new session name.

7) Delete button

8) Save button

Note that if you make changes to the tab's
settings while it's working (do not do this if you're on the target site
- sometimes the configuration is written into the cookie and the change
may be suspicious), then the new settings in all open tabs with the
same name will be applied automatically. This doesn’t apply to changing
connection settings - if they are replaced in an active session, all
open tabs with the same name will be closed with notify.

Session import/export: You can export and import your sessions including cookies, fingerprints and connection data. To save existing sessions, you need to press «LS data export (4)» at «Tools» and to load previously saved sessions – «LS data import (3)»

Session data export – allows you to upload one configuration data and personal cookies of the specified session, one at a time.

To export configs or cookies, click Tools -> Session data export, then select the session from which you are planning to export and select the data type – cookie or session settings, and then click “export”.

To import configs or cookies, click Tools -> Session data import, then select the session to import, specify the file and press «import».

Clear current session – pressing this button you can completely clear all session data, including cookies.

Please note that you can upload and download
cookies and session data in an encrypted format. To do this, leave the
"Encrypted format" checkbox active and specify the required password.
All session data and cookies in this case will be encrypted using a
particularly reliable encryption method, and you can absolutely safely
transfer them to another user of Linken Sphere.

Session manager allows you to get quick access to searching, opening and editing sessions. In order to open a session without making changes, you need to double-click on its name. By right clicking on the name of the session, you can call up a context menu that allows you to open a session without editing, with preliminary editing, or delete it. You can also use checkboxes for bulk selection sessions when deleting.

The platform definition column of the session:

1) Session name column
2) Session platform definition column
3) Session connections settings column
4) Session info column
5) Open without edit button (same as double-click)
6) Open with pre-editing button
7) Session delete button
8) Select all button
9) Unselect all button
10) Import select sessions button
11) Export select sessions button
12) Delete select sessions button

Session Information is a handy tool that allows you to access session information and edit text notes directly while working. To access this tab, click on the contextual tab, then select “session info”.

Connection settings:

You can use different types of connections for different tabs, and they can work simultaneously. This greatly simplifies and speeds up the work, because it allows you to keep the connection to the ssh or socks server in parallel tabs with your own anonymity settings and various cookies. If you didn’t select a different session when creating a new session, the tab will use the default Internet connection.

Pay attention, to work with different types of
connections you don’t need to use additional software - the entire set
of software for multi-thread proxy is included in the browser, and
starts working with it. You don’t need anything else to run and
configure it - the built-in proxificator will automatically apply the
necessary parameters.

1) Connection type:
No proxy: use a native Internet connection
Tor: use of the TOR network
Http: use http proxy connection
Socks5: connection to proxy with socks5
SSH Tunnel: using SSH connection
Tor + SSH Tunnel: use the TOR chain before connecting to ssh


Note that if you select http proxy, you can specify not only the ip
address of the connection, but also the destination host.

2) Connection validity check button. To speed up the work, you can check the status of your connection and the validity of the entered data before creating a session. To do this, enter the connection data and press “Check connect”
3) Server address: for connection
4) Port (the default for SSH connections is 22)
5) A field for manually entering the outgoing WebRTC leak (WebRTC public ip) when proxying a connection. In such cases, before entering the desired IP, you need to mark off «Proxy connection ip and proxy ip are same» checkbox
6) The field for specifying local ip address (WebRTC local ip) – you can write any necessary local address transmitted via a leak through WebRTC. Typically, this address can have the form 192.168.х.х


Note that when you creating a new session the local ip address is
automatically generated in the format 192.168.x.x - this is done to make
the sessions more unique

7) Login (if it is not required, it remains empty)
8) Password (if it is not required, it remains empty)
9) Check DNS – checking the manually installed DNS
10) Custom DNS – the field for entering a custom DNS. If Socks or tunnel doesn’t have it’s own DNS, or if you need to replace it, you have the option to register the correct address in this field.
11) Proxy connection are same – a disabling option that allows you to set the desired ip address of the leak through the WebRTC in case the incoming and outgoing IP connection addresses are different.

Pay attention that you can copy the
connection address in ip:port format directly in the ip field - the
system itself will recognize the required values and insert them into
the form.

After saving the tab with these connections, the browser will perform a validity check of the connection , and if it was successful, you will see a notification that the connection was made.

There are situations when the tunnel or proxy is unstable, then you have a possibility of additional checking (button 1 – «Check again». If after several checks the connection was still not established, then you should replace the tunnel or proxy to another one

TOR:

In the case of using TOR (both in its pure form and before the ssh connection), you may encounter a slowness of the chain, or with the need to obtain a new identity (chain).

1) Getting a new personality (new chain)
Note that once a new identity is received in the TOR, it takes some time to actually change the chain.

2) Reload the TOR network
3) Button to show current chain
4) Displays the current TOR chain

Please note that rebooting the TOR network or
obtaining a new circuit is completely safe when the SSH connection is
working - the built-in proxificator blocks the connection to prevent
traffic leakage. There is no need to disconnect an active SSH connection
before restarting the circuit. In case when you connect via TOR and
faced with the problem of no connection - just restart the connection
chain.

Configuration:

When creating a session, you can set the necessary useragent – choose it from the added ones by default, or set your own. You can also install the language required for the current session.

Also you can use the built-in configurations of real devices, which will allow you to set a cast of a real device in a few clicks. The browser has about 50,000 built-in real configurations, highest quality configs can be purchased in our configshop.

1) Useragent selector – you can select it from preinstalled useragents (also using filters), which contain both the default values set and those that were added by you earlier

2) «Manage» – useragent control button: you have the ability to add your own agents and delete or edit already added

3) Language helper by country – using this function, you can automatically set language parameters for the desired country using the real configuration data. Quite often, the language parameters of real users mean multilanguage with “weights” (q) – this parameter characterizes the user’s ability to use one or another language. If you use parameter setting using the MaxMind database, the language settings for your IP will be set automatically.

4) Language selection – – You can set the supported language for this session. Correct setting of the installed language means that the default language will be specified in Extended settings – for example, en-GB. In the HTTP Accept Language field, you must specify the required language in the same form: en-RU. Multilanguage is also supported, in this case, the settings of the language specified in the HTTP Accept Language will look like this: en-GB,en;q=0.8,en-US;q=0.6,en;q=0.4.

5) Touch screen emulation – emulation of a full touchscreen. This feature allows you to take full advantage of the emulation of mobile users, because not only recreates the “touch” effect in the eyes of the visited site, but also makes it impossible to detect your mouse or touchpad.

6) Emulate custom screen resolution – In case this function is selected, the browser will emulate the window to the specified resolution. This will not allow the site to know the real screen resolution of your device, and it will fully match with the useragent data. It is recommended to use, in particular, when working with a mobile agent. The real resolution of the proposed devices in useragents is indicated by default. You can set any other resolution depending on the need

7) WebGL – advanced settings of WebGL support parameters

8) Extended settings – advanced configuration settings by parameters HTTP, js.navigator, plugins/mimetypes

9) Менеджер реальных конфигураций – allows you to load a snapshot of a real device, including WebGL and JS Navigator parameters. When you use this option you don’t need to manually configure these parameters.

To manage useragents, click on the "manage"
button. To perform an action with the useragent, right-click on it, then
select the desired action - editing or deleting

1) Useragent search string: enter the data to search for the required agent
2) Edit the selected agent
3) Removing the selected agent
4) Adding a new agent
5) Saving the applied actions

You can add and use any number of necessary agents while changing or combining them within the session at your discretion. Together with the screen formatting function, you can achieve maximum emulation of the mobile device.

To quickly install the necessary useragent, just select it in the list and double-click on it.

Note: if you do not use the ready-made
configuration, you should carefully approach the parameters of advanced
settings that accompany the selected user. If the parameters http / js /
plugins / webrtc / webgl are not appropriate for this user, then this
may look suspicious.

Advanced settings of WebGL support parameters:

In your browser there is a mechanism for changing WebGL data which allows you to make all necessary settings of these parameters directly for each individual session. This greatly improves productivity and quality of work, because to replace these settings, you no longer need to intervene each time, replacing them after working with each account.

Today WebGL is represented by two generations of technology – WebGL 1/WebGL 2 . The first version is characterized by more lightweight features with a minimum of graphical functions. Usually, it is used in the Safari browser on MacOS along with an integrated video card, as well as in mobile devices. The second version of WebGL is inherent in browsers such as Chrome/Firefox due to its own support for these GPU browsers, which allows them to emulate WebGL 2 even in the absence of discrete video.

In the implementation of your browser, you can build an own unique fingerprint using preconfigured configurations, either based on the specified UserAgent and generating parameters. You can also manually adjust the generated parameters to achieve the best effect from substituting this parameter.

The main parameters of WebGl are characterized by the following features:
1) Supported Context Name – It is installed automatically and depends on the version. Not an editable parameter
2) GL Version – WebGL version with browser engine rendering
3) Shading Language Version – The shader version, describes the shader language and also contains information about the engine
4) Vendor – Manufacturer. Specifies the browser identifier, for Safari and Chrome it’s WebKit, for IE – Microsoft, for FF – Mozilla, etc.
5) Renderer – Name of the WebGL manufacturer. As a rule, almost the same as Vendor
6) Unmasked Vendor – Videocard manufacturer
7) Unmasked Renderer – Videocard fullname
8) Max Vertex Attributes – The maximum value of shader threshold attributes, as a rule, is 16
9) Max Vertex Uniform Vectors – The maximum value of the threshold homogeneous vectors, as a rule, is 1024, 2048, 4096, etc.
10) Max Vertex Texture Image Units – The maximum value of the threshold image texture processing modules, in most cases 16
11) Max Varying Vectors – The maximum number of mutable vectors, as a rule, is within 15, 16, 32
12) Max Vertex Uniform Components – The maximum number of threshold homogeneous components: 4096+-1024 (only WebGL 2)
13) Max Vertex Uniform Blocks – The maximum number of threshold homogeneous blocks: 15,16,32 (only WebGL 2)
14) Max Vertex Output Components – The maximum number of threshold output components: 128, 256, 512 (only WebGL 2)
15) Max Varying Components – The maximum number of components to be changed. The range is usually from 60 to 120 (only WebGL 2)
16) Max Interleaved Components – The maximum number of layers. As a rule, the following values: 64, 128 (only WebGL 2)
17) Max Separate Attribs – The maximum number of shared attributes. As a rule, 4 (only WebGL 2)
18) Max Separate Components – The maximum number of shared components ,. As a rule, 4 (only WebGL 2)
19) Aliased Line Width Range – Limit of the width of the connected lines. Specifies an array from and to. Example: [1,1] 20) Aliased Point Size Range – Limit of values of connected points. It is specified by an array, different for different devices. Example: [1, 255.875] 21) Max Fragment Uniform Vectors – The maximum number of fragments for homogeneous vectors. The following values are available: 1024, 2048, 4096
22) Max Texture Image Units – The maximum number of textures for images, as a rule, is 16
23) Max Fragment Uniform Components – The maximum number of fragments for homogeneous components. Example: 4096, 2048, etc. (only WebGL 2)
24) Max Fragment Uniform Blocks – The maximum number of fragments of homogeneous blocks. As a rule, 15,16,32,60 and so on (only WebGL 2)
25) Max Fragment Input Components – The maximum number of fragments for input components. As a rule, 128, 256 (only WebGL 2)
26) Min Program Texel Offset – The minimum deviation of texels for programs is usually -8 (only WebGL 2)
27) Max Program Texel Offset – Maximum deviation of texel for programs. As a rule, 7 (only WebGL 2)
28) Max Draw Buffers – The maximum size of the graphic buffer. As a rule, 8 (only WebGL 2)
29) Max Color Attachments – The maximum number of color inserts. As a rule, 8 (only WebGL 2)
30) Max Samples – The maximum number of samples. As a rule, 8 (only WebGL 2)
31) Max Color Buffers – The maximum value of the color buffer. Used only in WebGL 1. As a rule, 8
32) RGBA Bits – The number of bits that are allocated for color storage. As a rule, 8
33) Depth – Depth of color in WebGL. Possible Values: 24\32
34) Stencil Bits – The number of bits that are allocated to store a color template is usually 8
35) Max Render Buffer Size – Maximum buffer size for reproduction or rendering. Values can be different, for example: 4096 or 16384, must necessarily be a multiple of 1024
36) Max Viewport Dimensions – the maximum size of the visible area, is calculated from the playback buffer. As a rule, it takes values in the form of an array. Example: [4096.4096] 37) Max Texture Size – The maximum size of the texture. Typically, it is also equal to the playback buffer. Example: 4096
38) Max Cube Map Texture Size – The maximum size of a cubic texture. Typically, it is also equal to the playback buffer. Example: 4096
39) Max Combined Texture Image Units – The maximum number of textures of combined images. Example: 80, 120, 160, etc
40) Max Anisotropy – Maximum anisotropy. As a rule, 16
41) Max 3D Texture Size – The maximum size of 3D textures. Possible values are: 2048, 4096 etc. (WebGL 2 only)
42) Max Array Texture Layers – The maximum number of layers in the texture array. As a rule, 2048, 4096 (only WebGL 2)
43) Max Texture LOD Bias – Maximum deviation when detailing textures. As a rule, 16 (only WebGL 2)
44) Max Uniform Buffer Bindings – The maximum size of a homogeneous communication buffer. Example: 75 (WebGL 2 only)
45) Max Uniform Block Size – The maximum size of homogeneous blocks. Typically, 65536 (only WebGL 2)
46) Uniform Buffer Offset Alignment – The maximum size of a uniform alignment buffer. The possible values are 128, 256, 512 (only WebGL 2)
47) Max Combined Uniform Block – The maximum number of connected homogeneous blocks. As a rule, 75
48) Max Combined Vertex Uniform Components – The maximum number of bound homogeneous threshold components. Different values are possible. Example: 249856, the multiplicity condition is satisfied 1024 (only WebGL 2)
59) Max Combined Fragment Uniform Components – The maximum number of connected homogeneous threshold fragments. Different values are possible. Example: 249856, the multiplicity condition is satisfied 1024 (only WebGL 2)
60) Supported WebGL Extensions – The list of extensions that WebGL supports. Depends on the type of browser

Extended Settings:

Extended settings – every time you install a new useragent you get an automatically generated js.navigator, plugins, and mimetypes configuration. You have the ability to manually adjust these parameters depending on the requirements of a particular situation.

Http headers: in this menu item of the advanced settings you can specify the Accept and DoNotTrack parameters (for example, if the header passes the donottrack = 1 parameter, the prescribed header should be DNT = 1)

Accept header indicates which Myme-type of Web content the browser supports. For each browser this parameter can differ by default. When choosing a useragent, you should carefully evaluate which header the given useragent is giving and add it to the header. (Example: Accept: */* Accept: text/html, application/xhtml+xml, application/xml;q=0.9, */*;q=0.8)

js.navigator: for editing you are available all the standard parameters of navigator webkit engine:
Navigator.vendor – The manufacturer of the browser. Google inc, or Apple inc, or may be empty (Example: Google inc)
Navigator.language – The default language. Must be the first in the list of languages from HTTP Accept Languages (Example: en-US)
Navigator.productsub – Subversion of the browser engine. Different between WebKit and Gecko. IE is not set by default (Example: 20030107 for Chrome)
Navigator.HardwareConcurrency – Number of processor cores (Example: 4)
Navigator.maxTouchPoints – The maximum number of touch points in the touchscreen. As a rule, for touch devices this indicator is equal to 5 and 0 without touchscreen (Example: 0)
Navigator.platform – Operating system (Example: Win32)
Navigator.doNotrack – Prohibition of tracking advertising services, the fact of the forbid on the return of everycookies and other things. It is also necessary to specify the header DNT 1 if enabled. (Example: true, in http: DNT = 1)
Navigator.gamepads – Joysticks connected to the device.
Navigator.battery – Transmission of information about the presence and condition of the battery. Activation is recommended when working with emulation of mobile devices.
Navigator.webdriver – Transfer information about using the browser emulator.
Navigator.Online – Transmission of information about the availability of Internet connections.
.mediaDevicesenumeratedevices – Displays video and audio media devices along with their unique hashes via WebRtc. You can forbid the transfer of hashes of embedded devices, allow the transfer of real data or use a hash substitution (Example: fake)
screen.availHeight – Available screen height
screen.availWidth – Available screen width
screen.availTop – Available extreme upper point along the Y axis
screen.availLeft – Available extreme upper point along the X axis
screen.colorDepth – Color density 24\32
screen.pixelDepth – Density of pixels 24\32
window.devicePixelRatio – A non-standard pixel metric per inch, a display indicator with a high pixel density
window.innerHeight / innerWidth – Internal height and width of the window, excluding scrolbars, tabbars, etc.
window.outerHeight / window.outerWidth – External height and width of the window, including scrolbars, tabbars and so on.
window.pageXOffset / window.pageYOffset – Indent by X, Y on the page from the left edge respectively
window.screenLeft / window.screenTop – Coordinates of the top left edge of the window in the global coordinates of the screen (Not supported in Gecko)
window.screenY / window.screenX – Coordinates of the top left edge of the window in the global coordinates of the screen

Plugins and MymeTypes. Plugins are one of the first and main fingerprints used to track and identify users. Almost in each protection script antifraud systems somehow this parameter appears. Initially, when you create a session in the system, the plug-ins with their own MymeTypes are randomly generated. You can make the necessary changes in the manual mode.

It is necessary to carefully configure them, especially regarding the name of the files. Note that for different OS the extension has a different appearance:
*.dll for Windows
*.plugin for MacOS
*.so for Linux

Extensions may also not be, for example, in the case of Chrome. In this case, the file can be named, for example, thus: mhjfbmdgcfjbbpaeojofohoefgiehjai

We also recommend paying attention to MymeTypes – generation is random and doesn’t always create perfect configs. For example, if it is clear in the title that the plugin is working with video, then Myme can not be pdf or txt, but should match the work with the video format. Otherwise, when human parameters are considered, there is a probability of detecting a substitution.

A list of all available MymeTypes can be viewed, for example, here: https://www.sitepoint.com/mime-types-complete-list/

Display settings:

1) window width for the current session in pixels (weight)
2) window height for the current session in pixels (height)

You can set the required window resolution, and also use the built-in size formatting mechanism to prevent a conflict between the physical and actual resolution of the window. If you suspect that a site can use the permission check function, then set the physical screen size. This item will allow you to view the site in the physical resolution that was specified when creating or editing a session.

To fully emulate a mobile device, you can use the touchscreen emulation – in this case, the site will not be able to detect the substitution, because the mouse or touchpad will be completely inaccessible for definitions.

You can also avoid identifying real resolution by CSS analysis. To do this, in the general settings (Edit -> Preferences / MacOs: Linken Sphere -> Preferences), you must specify the required screen resolution for CSS definition.

Note that the technicalities assume common
screen settings for all the current sessions. Therefore, you can't
specify CSS permission for individual sessions. At the same time, this
parameter doesn't affect anything else except defining it in this way
and is used without restarting the browser - it's enough just to open
this session again or clone the tab.

Geo and system time:

In this menu, you can specify the required geo-positions and system time parameters, using them you can pass the values to the site without failure in the definition and without possible leaks of the real position

1) USA states selector – to facilitate the choice of the time zone when working in the US, you can choose it from the state. 2) Timezone name
3) System time: you can select the time zone (UTC or GMT), as well as specify its offset from 0 to -1
4) Selecting the required geographical latitude (latitude)
5) Selecting the required geographical longitude (longitude)

Note that if you leave these fields empty,
even on the request of the site, the browser will not give the real
geographic position, but will respond with a refusal in the definition.
This prevents a possible leakage of a real location

From version 5.0 we integrated the most complete licensed geobase MaxMind into the browser – the most popular statistics of ip addresses in the world. To set the location and time using the database, just press the “check proxy / geo” button and save

Note that different checkers can use different
bases, which leads to a mismatch of addresses. We strongly recommend you
to focus on the MaxMind database, because it's the most popular base in
the world for determining the connection address.

Anonymity:

The browser implements many deanonimization protection systems. Using them all will avoid obtaining real information about the computer, system, ip address and geographic location. However, there may be situations where setting up the computer makes it necessary partial refusal to use them

In order to increase the flexibility of the product, the option of partial or complete disabling of their functioning was provided. Refusal to use them is provided for experienced use, and browser developers can’t be held responsible for the safety of it’s use when disabling one or more protection points. When creating a default tab all items are automatically activated. However, you can change this configuration at any time.

If you don’t use the ready configuration, after installing the user and creating the session, you will receive the parameters that will be generated automatically. The generator not always provide the perfect tuning result, so when it needs to be perfectly accurate, we recommend using preconfigured configurations or performing manual configuration using the extended mode (Extended settings/WebGL ).

4.9

The inclusion of basic deanonymization protection systems includes:

OTR mode (Off-the-Record). Logging is disabled in this mode, and the current information about the actions within the session is stored in the RAM, which excludes its unauthorized use. After closing the browser, the entire history and logic of the visits is permanently and irretrievably deleted.

Starting with version 5.3 it's no more sessions without OTR - OTR-mode now works by default

1) Anonimity checker. You can enable the loading of the anonymity checker (or another start page) after the tab has been successfully created. You can set the address for transfer to File -> Preferences -> Default anonymity checker (MAC OS: Linken Sphere -> Preferences -> Default anonymity checker)

2) Enable HTML5 localStorage – local storage. Allows to fulfill some JavaScript functions, data is deleted after the browser is closed

3) Save localStorage data – allows you to save local storage data and use it after rebooting the browser (without this option, local storage data is cleared after the browser is closed)

4) Disable pop-ups – when using certain sessions, you may need to block pop-up windows. This feature allows you to prevent the creation of pop-ups on the page.

5) Enable fake WebRTC leak. WebRTC technology is widely used to play media content and, in most cases, is active with ordinary users. However, it is also one of the most significant reasons for leaking the native IP address. Most plugins for browsers only allow you to avoid leaking real IP, leaving this service active. The fake leakage function in this product allows the leakage of the address, while replacing the actual IP with the one used for the final connection. That means that when you use ssh or proxy connection, it will be transferred exactly ssh or proxy IP address, which will significantly improve the credibility of the user on the part of systems trying to deanonymize his real address. In the browser it is not just a matter of substituting values, but real work with the server to change the results. In addition, we recommend you to use the function of fake draining of hash devices by WebRTC. You can both disable the transfer of the parameters of the built-in hardware (by default), and determine the transmission of real or corrected values ​​(Extended settings -> .mediaDevices.enumerateDevices -> false/true/fake).

Note that this function is not available when
creating a pure TOR connection. Anonymization tools do not allow
creating conditions for preventing detection of this network. Use TOR
only to bind to another connection (via ssh), or to surf at the deep
web.

6) Disable WebRTC

7) Emulate custom screen resolution. Allows to avoid deanonymization of the real screen resolution of the computer, improving the quality of work when using various agents, especially mobile. Using this function helps to avoid problems when working with sites that use resolution checking systems. In particular, when using mobile useragents with a resolution lower than the native resolution of your computer, confusion may occur, in which the actual screen resolution is physically greater than the maximum resolution of the device whose useragent is used. An example is the iPhone user used when working with a device with the actual FullHD resolution.

8) Fingerprint protection – protection from de-printing the system. Based on the removal of a group of several characteristics, it is possible to identify the user. The main parameters for the removal of a print is a combination of plugins, fonts, an useragents, the operation of video and audio cards. The browser implements smart protection, which not only doesn’t allow the site to determine the real characteristics of the computer, but also stores the changed data for a particular session, which allows you to provide the initially declared characteristics each time. They are unique and can be assigned to each new tab once and for all, which eliminates the need to repeatedly configure the computer to work. Thus, when you reload the default tab, it will have the same cookies and prints with which its history is associated.

If protection is enabled, the following types of fingerprints are substituted and uniquely identified:
Canvas fingerprint

Audiofingerprint

Fonts fingerprint

ClientRects fingerprint

Ubercookies (use audiofingerprint and clientRects)

9) Custom plugins and mimeTypes – unique unification of user’s fingerprint by plugins and types of supported files.

10) Encryption and savingcookies of current session after you exit the tab. It allows not only to save cookies with the possibility of their further unloading, but also to keep them in an encrypted form for increasing work safety. The use of individual cookies allows you to conveniently work in multithreaded mode without the need for their constant downloading and unloading, as well as without using a large number of portable browsers.

11) Enabling Flash. Currently available technologies do not allow you to fully use the anonymization tools when working with Flash. Nevertheless, for experienced users who know where and when it is possible to use it, the possibility of its activation was left. By default, this menu item is inactive, but if necessary, you can enable it.

12) Use dynamic fingerprints – allows you to disable saving of static fingerprints for a particular session. When this checkbox is activated, the session will have new fingerprints each time after opening.

13) Service worker – a special service for web content. The service worker performs some manipulations with the cache and in the OTR-mode this option should be disabled for security reasons. If a particular site doesn’t work correctly, you can activate this option, but in other cases, we recommend using the browser without it.

Basic settings:

1) Basic settings (Edit -> Preferences)

1) Set default anonymity checker. The transition to this page occurs after the successful creation of tabs.

2) Set default search engine. Depending on your preferences, you can specify the default search engine from the suggested options.

3) Set user-agent for default session. You have the option to set the useragent for the session used in the default browser. This will allow you to comfortably use the browser, as a normal mechanism for everyday surfing on the Internet.

4) Set default accept language. You have the option to select the default language for the basic session.

5) Set save downloads path. You can select the directory where you want to save the downloaded files.

6) CSS resolution (the result can be checked on the values device-width/device-height)

7) Set default font. You can select the font used in the default browser.

8) The option allows you to preload webview in the background tab (some graphics resources are required for the successful operation of the option.If you have problems with the background tab, you can disable this option)

9) Option that allows you to set up a license check directly, without using TOR

10) Enable or disable the password saving option with automatic login.

11) Disable url helper – allows you to disable saving of previously visited pages in the search box

12) Tor port – installation of the port for authorization. This function is intended for teamwork on one remote server and allows using different ports for authorization.

13) Data override. The function is used to select the operating mode for changing the system time for teamwork. If you are working on a single remote server, you must select a date change via JavaScript.

Manage bookmarks:

1) Add bookmark

2) Show all bookmarks

3) Delete all bookmarks

4) Recently closed tabs – with this function, you can restore tabs that have recently been closed. Much easier to work with that when you re-open the browser, because it allows you to restore the last active session in a few clicks.

Downloads:

Download Manager allows you to view downloaded files

1) Go to “downloads”

Clearing the session:

You can clear current session (cache and cookies)

1) Clear data of the current session

Jabber: [email protected]
ICQ: 683887366
Email: [email protected]
Telegram Username: @blazecracker
Telegram Me: https://t.me/blazecracker
Telegram Channel: https://t.me/v4vendettanews_com

_____________________________________________________________________

The price for this tool is $199 USD. After making the payment leave the page open until Bitcoin receives all the confirmations and and the payment is confirmed. It might take 10, 15 minutes but after the payment is confirmed the page will redirect you to the download link automatically. If you have issues contact me via email or jabber!

_____________________________________________________________________

v4vendettanews

View all posts

v4vendettanews

error: Content is protected !!