Thursday, July 28, 2016

Must have apps for Hackers' mobile phones

Recently there is a post on flashpoint-intel.com about the Jihad's technologies used for their anonymity and other purposes in Mobiles. Here I will classify that article more details can be find at the above link.


When we go through that article we can see Jihads has very focused on mobile security with android. We will go by each category that they have used.

Secure Browsers.


Our mostly faithful browser is TOR. Jihads also using TOR browser for their internet surf but they are using additional layer of security also instead of the layer built-in TOR. Because now NSA has intervene with TOR.

Instead of TOR they are using Opera Browser also. The reason for this selection is because the new Opera provide free VPN service along with the browser. So they can mask their IP while browsing.