Search For sale
Use the down arrow to enter the dropdown. Use the up and down arrows to move through the list, and enter to select. To remove the current item in the list, use the tab key to move to the remove button of the currently selected item. Use Escape to close the dropdown and return to the search box.
No results found
Navigate Categories by tabbing to the major areas. Use the Down key to open the subcategory and then use the Down key once more to enter it. Navigate the subcategory using the Up and down keys. Once on the subcategory you are interested in. Use the Enter key to navigate to that page.

Take action

$400

Fully Anonymous Ghost Laptop (With Accessories)

Posted 4 months ago in Kunkletown, PA

Listed in categories:

Sold by

Get a second opinion

Chat securely on the app

Fully Anonymous Ghost Laptop (With Accessories)

Additional images

Description

Information: -(PRICE IS FLEXIBLE) This laptop has been modified at the hardware and operating system level to provide the user with full anonymity and security. (If requested, the laptop can be delivered the same day within 15 miles [this includes meeting half way]) Items: -1 Laptop (16bg ram, capable of heavy programs and gaming) - 2 bootable flash drives (1 containing Tails, 1 containing Kali linux) -2 external USB network adapters -Precision tools to access and modify hardware and components (for convenience) -1 bag with several pockets to store and transport items. -1 charger -1 wireless mouse Details/modifications: This device has been modified by removing and physically disabling certain components to provide security and anonymity, including: The SSD (to ensure no files, data, or forensics can be stored on the device), the built in wifi adapter (to prevent the MAC address from being static or linked to the device's hardware, camera, microphone, antennas built into the hardware have been disconnected. Tails OS automatically randomizes the MAC address on startup, and the USB contains no persistence (nothing can be saved on the device or flash drive). Kali Linux also has the ability to spoof the mac address (typically for cybersecurity and penetration testing)

All content is available to screen readers from the outset. The See more button is for visual users only to expose content incrementally that is already available to you

Details

Condition

Used (normal wear)

All content is available to screen readers from the outset. The See more button is for visual users only to expose content incrementally that is already available to you

Item location map

Map is approximate to keep seller’s location private.

Related searches

  • Laptop
  • Gaming computer
  • Computer monitor
  • Hp laptop
  • Desktop computer
  • Routers
  • Computer parts
  • Lenovo laptop
  • Modem router
  • Wifi router
  • Refurbished laptops
  • Notebook
  • Computer keyboard
  • Toshiba laptops
  • Modem
  • Curved monitor
  • Asus router
  • Hp notebook
  • Wireless mouse
  • Chromebooks