1Preface: How Not Be A Ghost in the Machine
35Ostel: Encrypted Phone Calls
2Chapter 1: Cell Opsec and the Powers That Be
36TextSecure
3Anonymity and Privacy
37Pixelknot: Hidden Messages
48 Deadly Myths of Cell Phones
38Ghost Apps for the Black Market
5How The NSA Spies On You
39NoteCipher
6How Windows 10 Spies On You
40APG
7How to Tell if Your Phone is Tapped
41Bitcoin Wallet
8How to Stay Anonymous Overseas... in ANY Country
42ChatSecure
9Chapter 2: The 10 Best Phones for Anonymity
43Firefox Addons
10I.) Blackphone
44Privoxy
11II. Blackphone 2
45TACO
12III. Boeing's 'Black' Phone of Self-Destruction
46AdBlock Plus
13IV.) BlackBerry
47NoScript
14BlackBerry Security
48uMatrix
15How to Disable Automatic OS Updates on BlackBerry 10
49Cell Keyloggers
16V. Older & Generic Burner Phones (aka Cheap Phones)
50Detecting Keyloggers
17Nokia Lumia 520
51Chapter 4: Tor and Cell Phones
18Motorola i355 Radio/Cell Phone
5210 Tor Rules for Smartphone Users
19Samsung S150G (TracFone)
53Anonymous Android: Mission Impossible
20Disaster Preparedness
54How to Access Hidden Onion Sites on the Deep Web
21Questions and Answers
55Linux Darknet Edition
22Chapter 3: 20 Ghost Apps for Smartphones
56Bypassing Websites That Block Tor
23Signal for Android
57Can the government track which sites I visit over Tor?
24Orweb
58Chapter 5: Black Markets on the Deep Web
25Orfox: Tor Browser for Android
59Marketplace Invites
26Telegram
60The BlackMarket Superlist
27Chat Secure
61Shipping & Receiving: Thou Shalt Nots
28K-9 and OpenKeychain: Encrypted E-mail
62To Finalize Early or Not?
29KeySync: Syncing Trusted Identities
63Blackmarket Arrests
30LastPass Password Manager
64OPSEC for Buyers
31Linphone: Encrypted Video and Voice Over IP (VOIP)
65Vendor Opsec
32ObscuraCam: The Privacy Camera
66Postal Drops & Controlled Deliveries
33Orbot: Proxy with Tor
67Escaping the West!
34Osmand: Offline Maps and Navigation