This little USB drive changes EVERYTHING....

NinjaStik - Online Anonymity and Security in 60 Seconds

In less than 60 seconds you can have...

Blog Anonymously with a NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Online Anonymity

Tor in 60 Seconds

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Secure Storage

256 bit Encryption

Comment Anonymously with a NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Encrypted Email

Enigmail w/ OpenPGP

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Portable Privacy

Use It Anywhere

Surf ANYTHING….. Anything You Want….. in Total Privacy

Anonymity

Would you give your phone number or home address to every website you've visited this week?
Everything you do online is connected to your IP address - every webpage, website, email and tweet has your IP address attached to it.  Think of  an IP address like your home address or phone number - it identifies who you are and where you are located. The NinjaStik uses the Tor network to anonymize and hide your IP address.  If your first question is 'what the heck is Tor?' scroll down a bit for the full explanation.  Without a NinjaStik you would need to download, install and configure Tor on your computer to make yourself anonymous.   

...and, as others have noted, it can take a bit to get Tor working - my first time trying to set it up took days...with a NinjaStik I was online with Tor in less than a minute...

The NinjaStik

NinjaStik - Online Anonymity and Security in 60 Seconds NinjaStik - Online Anonymity and Security in 60 Seconds

Private Browsing

Are You Using 'Private Mode' or 'Incognito Mode'?
You may not realize it, but the so called 'private browsing mode' in many browsers is useless.  This includes Incognito mode in Chrome, InPrivate mode in Explorer and Private mode in Firefox. 'Private Browsing mode' might hide your online activity from someone who isn't looking, but that is about all it will do. Not to mention the fact that it doesn't hide anything from your ISP - your Internet Service Provider - they have logs of every single website you visit, even in 'private mode'. Those logs are attached to your account, your home address and your name.  As seen in the news recently, those logs are stored by the US NSA forever. 'Private mode' is not private at all. Think about that - Every website, every single page you visit is attached to your name. Even in 'private mode'.

Introducing The NinjaStik

An All-In-One Online Privacy Device

Simply put - the NinjaStik protects your privacy, hides your IP address and secures your data!

Just plug it into your computer, boot from the NinjaStik and in 60 seconds...

You are online Anonymously, you have uncrackable encrypted storage and secure, encrypted email.

Browse Anonymously, Blog, Shop and Communicate ANONYMOUSLY in 60 seconds

Anything you do while using the NinjaStik is hidden and secure - it leaves no trace of your activity on your computer.

No extra fees or subscriptions at all. Just buy it, plug it in and use it as much as you want!

NinjaStik Overview Video




Blog Anonymously with a NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

For Privacy

The NinjaStik lets you decide if and when you want to be private and browse anonymously. UsingTor - the same protection system used by people and organizations across the planet in threatening undemocratic environments. Privacy is your right and the NinjaStik makes it very easy to preserve your rights against all threats.

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

For Security

Every NinjaStik is fully protected with 256 bit encryption. Allowing you to save and store any data you want on the USB drive in complete security.  The NinjaStik comes with a complete desktop including editors for word, spreadsheets and images. Save, edit and share data without ever worrying that anyone else can access it.

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

For Everyone

The NinjaStik is designed from the ground up for non-technical users.  If you can turn on a computer, you can use a NinjaStik. Privacy and the ability to browse anonymously should be available to anyone, of any ability.  The NinjaStik makes this a reality. Simply plug in the NinjaStik, boot from USB and you are secure in 60 seconds.

NinjaStik - Online Anonymity and Security in 60 Seconds

THIS LITTLE USB DRIVE REALLY DOES CHANGE EVERYTHING

Protect Your Privacy

How many times have you worried about someone using your computer and finding something you want to keep secret? That question alone should convince you right there - asking yourself "did I delete my history last time?''- and then worrying the whole time that they might stumble across something private?

Read More

You can browse anonymously, have freedom, peace of mind, privacy and security right now with a NinjaStik. If you've been looking for a way to browse anonymously - this is it. When you are done, turn off the computer, unplug the NinjaStik and there is no trace of your activity left on the computer you just used. Not just hidden, no trace whatsoever. Period. Even better - the NinjaStik allows you to save data, bookmarks and files - documents, pictures and video - in complete security. The NinjaStik is fully protected with 256 bit encryption. Untouchable and unhackable storage. So now you have a way to browse anonymously, surf any website in complete privacy, with complete security and it's portable - use it with almost any computer - PCs and Macs.

Protect Your Business

You work with valuable company information – data that is critical to the success of your company. If anyone, competitors, media or hackers, were to get access to your information it could destroy your business. How important is your data? Protect your communications online and offline by using the NinjaStik. 

Read More

With a NinjaStik your browsing is protected with TOR and all data saved to the NinjaStik is protected with 256bit encryption – that is much, much safer than having your data sitting on an unprotected usb key that you keep in your briefcase or pocket.  Protect your business in 60 seconds with a NinjaStik.

privacyquote

What the Experts have to Say about the NinjaStik

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

So for those times when you really don’t want your friendly national surveillance service (or that freak Carrie Mathison from “Homeland”) watching everything you do online, there’s NinjaStik. For everything else there’s, well, everything else.  I feel much safer already.

Dan Tynan - ITWorld

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

For most people, spending less than $70 on a device that they know will work, and has great support from Jeremy at NinjaStik.com, is a lot easier than messing with something they are not fully schooled in. No hassle, guaranteed.

JK Privacy

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

...quite simply, the NinjaStik does what it says on the tin and I heartily recommend it to anyone who wants secure and anonymous online communications as well as encrypted file storage without the hassle of having to learn how to configure it all themselves.

Alexander Hanff - Think Privacy

Reviews on the Run – video review of the NinjaStik

Blog Anonymously with a NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Online Anonymity

Tor in 60 Seconds

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Secure Storage

256 bit Encryption

Comment Anonymously with a NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Encrypted Email

Enigmail w/ OpenPGP

NinjaStik - Online Anonymity and Security in 60 Seconds. TOR made easy, secure and portable.

Portable Privacy

Use It Anywhere

60 Seconds to Anonymity with Tor

The NinjaStik will have you online with Tor in less than a minute, but... you may be asking 'What the Heck is Tor?'

Read More

What is Tor? Tor is The Onion Routing network.

Tor, or The Onion Router, is a system first implemented by US Navy research to allow intelligence agents to use the internet without being traced, by encrypting and routing communications through many different internet servers. Subsequently, Tor development has been continued by MIT and by the California internet rights watchdog the Electronic Frontier Foundation and the Torproject.

Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt. - 2011 Free Software Foundation Awards

TOR is a very secure and trusted method of being online anonymously.

Tor's anonymity function is "endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists - CNET

Here is an diagram of how Tor works

tor

You can download and install Tor to your computer or install Tor to a USB or flash drive right now, free!

If you have been trying to download, install and configure Tor or get Tor on a USB or flash drive - there are many great tutorials online that will walk you through it.

BUT - The problem remains that if you do not set it up perfectly, your anonymity is certainly still at risk. Anyone who gains access to your computer will be able to see that you have Tor installed. Any virus on your PC could still compromise your communication and online activity. Your computer may also have software that refuses to connect through Tor and is leaking your identity around Tor and leaving you vulnerable.

Why risk your privacy and identity? The NinjaStik has Tor ready to use.

The NinjaStik takes you online anonymously with Tor in 60 seconds - just plug it in and turn on your computer.


NinjaStik

Will the NinjaStik Work with My Computer?

The NinjaStik will work with almost any computer that can boot from USB.

Desktops, Laptops, Netbooks, PCs, Macs, MacBooks too!

Read More

The NinjaStik works with most computers including Dell, Toshiba, Sony,Lenovo, HP, Asus, Apple, almost any computer out there.

And remember - if you find that your computer doesn't work with a NinjaStik, you have the assurance of the 100% money back guarantee.

Using your NinjaStik with a PC

Step 1 - Turn off your computer!

If you plug the NinjaStik into a running computer it will say 'device is empty' or 'device requires formatting'. Do not format the NinjaStik. Turn off your computer!

Step 2 - Plug in the NinjaStik and then turn on your computer.

Step 3 - Select boot device

Right after turning on your computer, within 1 to 3 seconds, the screen will flash a message 'Press __ for boot device' or 'Press __ to select boot order'. It is usually ESC, F10 or F12. Step 4 - Select USB as the boot device and the NinjaStik will load up.

Step 5 - Enter your encryption passphrase (default is 'password')

Then enter your login password (default is 'password')

Once the NinjaStik desktop has loaded, if using WIFI, you will need to configure your WIFI connection. Once you have connected the WIFI, exit the Vidalia control panel, click on the start menu, select logout. Logout, then log back in and the NinjaStik will automatically connect with WIFI, configure TOR and confirm the status on the Firefox home page.

Using your NinjaStik with a Mac

The NinjaStik will work with many Mac computers, but only those with Intel processors and the ability to boot from USB. The NinjaStik has been tested and working flawlessly on a first gen MacBook Pro and a second gen Mac Mini. We have also had customers with the MacBook Air 4,2 boot right up with the NinjaStik using method 1- no problems at all.

There have been some NinjaStik owners having difficulty getting the NinjaStik to work on Macs with OS Leopard and Snow Leopard.

If you have a Mac and want to use it with the NinjaStik it is best to find out if it will boot from a USB device PRIOR to buying the NinjaStik.

Your Apple store or online forums will be best able to help you determine if your specific Mac computer can use the NinjaStik.

Step 1 - Turn off your Mac!

If you plug the NinjaStik into a running Mac it will say 'device is empty' or 'device requires formatting'. Do not format the NinjaStik. Turn off your Mac!

Step 2 - Plug in the NinjaStik.

Step 3 - Select boot device

Turn on your Mac - right after the start up chime, press and hold the 'option' key. You will be presented with the boot options. Step 4 - Select USB as the boot device and the NinjaStik will load up.

Step 5 - Enter your encryption passphrase (default is 'password')

Then enter your login password (default is 'password')

Once the NinjaStik desktop has loaded, if using WIFI, you will need to configure your WIFI connection. Once you have connected the WIFI, exit the Vidalia control panel, click on the start menu, select logout. Logout, then log back in and the NinjaStik will automatically connect with WIFI, configure TOR and confirm the status on the Firefox home page.

That's it - that is how easy it is to make the NinjaStik work on your Mac!

If you have any questions, please contact help@ninjastik for assistance. Now what are you waiting for?

ninjastik

Latest Blog Posts

  • Anonymous browsing with the NinjaStik - Privacy Simplified

    OpenSSL bug

    The news this week about the OpenSSL bug is just another reason to always install updates. From the Torproject website; The browser part of Tor Browser shouldn’t be affected, since it uses libnss rather than openssl. But the Tor client … Continue reading

    Read More

  • NinjaStik electrum recover bitcoins

    What happens if….

    We had an excellent question from a customer this week; What happens to my Bitcoins if my NinjaStik is lost, damaged or confiscated? There are many unfortunate things that can happen to any USB drive – they can get lost, … Continue reading

    Read More

  • anonymous browsing with the ninjastik - privacy simplified

    Staying informed on privacy threats….

    There are hundreds upon hundreds of news reports, articles and blogs talking about the NSA, online privacy or the lack thereof. This is a quick post to mention a great resource to stay informed about threats to your online privacy. … Continue reading

    Read More

106 queries in 2.404 seconds.