Darknet Extreme Virtual Machine (SD Card)-16GB ~ 3 months old -- Ships From United States

0.95503178 BTC
$118.72 USD


Preview of available shipping methods:


Item Description:
Version 3.0

• Cross platform virtual machine for the free open source VirtualBox hypervisor that can be run on Linux, Mac OS X, and Windows operating systems.

• Full featured, easy-to-use Ubuntu Desktop 13.04 (Linux) operating system with full disk encryption, Mozilla Firefox browser, Thunderbird with Enigmail installed for pgp secured email communications. (The Darknet Extreme Virtual Machine is offered in a 32-bit or 64-bit system configuration. Please specify the desired configuration when placing your order).

• Enables anonymous activity with the installed I2P (Invisible Internet Project) and Tor Browser Bundle open source software packages.

• Powerful open source encryption technology (TrueCrypt and GNUPG).

• Plausible deniability– the Darknet virtual machine resides in a hidden, encrypted TrueCrypt container (with an exfat file system) which is itself enclosed in an encrypted outer TrueCrypt container. If you don't require plausible deniability you can move the virtual hard drive outside the TrueCrypt container and eliminate the dependency on the TrueCrypt software. You will still have full disk encryption but will loose the plausible deniability feature.

• You can change the default TrueCrypt passwords to manage your own security policies. You can also change the Ubuntu full disk encryption passphrase.

• Comes with I2PSNARK and Robert - I2P based bittorrent clients that enable anonymous file sharing within the I2P network.

• Extremely fast! – The package is installed on a SanDisk Extreme Pro SDHC UHS-I 16GB Memory card that has speeds up to 95MB/s (class 10).

• Included is the Darknet Extreme Virtual Machine User's Guide ebook in epub format installed in the included Calibre Library.

• Includes free technical support via email.

Added bonus! Security and anonymity books in pdf format (in the Computer Forensics ebooks folder on the Linux Desktop):

- Anonymous Security Starter Handbook
- Beware the Dangers of Metadata
- Computational Forensics
- Computer-Aided Forensic Facial Comparison
- Computer and Intrusion Forensics
- Computer Forensics - A Pocket Guide
- Computer Forensics Computer Crime Scene Investigation
- Computer Forensics For Dummies
- Cyber Forensics
- Digital Forensics for Network Internet and Cloud Computing
- EnCase Computer Forensics
- Forensic Computer Crime Investigation
- Forensic Computing - A Practicioners Guide
- Hacking Exposed Computer Forensics
- Handbook of Computer Crime Investigation-Forensic Tools and Technology
- Handbook of Research on Computational Forensics Digital Crime and Investigation
-Incident Response and Computer Forensics
-Incident Response and Computer Forensics Toolkit
-OpenVPN-2 Cookbook
- Privacy Protection and Computer Forensics
- Scene of the Cybercrime Computer Forensics Handbook
- The Best Damn Cybercrime and Digital Forensics Book Period
- Virtualization for Security


This item has no feedback yet.