Ansar Al-Khilafah ZeroNet Edition


Ansar Al-Khilafah Media Presents


Ansar Al-Khilafah ZeroNet Edition

We have created an edition of this website on the ZeroNet Peer-to-Peer network ( as a permanent backup and uncensorable version of this site. ZeroNet is a secure and decentralised Peer-to-Peer network which allows websites to be hosted by each viewer and sent to new viewers using BitTorrent technology. This means the website cannot be deleted as it is hosted by everyone who visits it, and the people who visit it automatically download it and start seeding the website to new viewers. This means ZeroNet sites are not hosted by a single person, they are hosted by everyone. In case the WordPress version of this site is deleted, please bookmark the ZeroNet version for future updates.

To view ZeroNet websites, you need the ZeroNet software installed and running. The address of our ZeroNet site is the following:

Below is a short guide on how to install and use ZeroNet on Microsoft Windows:

1. Download the ZeroNet software from



2. Then go to the folder or Desktop where you downloaded the ZeroBundle-win file, and double-click it to open it.



3. After you open the ZeroBundle-win file, it will have a folder called ZeroBundle. Double-click it to open it.



4. Then double-click the zeronet file. Depending on your folder settings, it may be called zeronet.cmd.



5. After you click on the zeronet.cmd file, the program starts silently running. It will take a few minutes for it to start connecting to other Peers. Connecting to Peers is necessary to start sharing data and sites between each other. After it connects to enough Peers, it automatically opens the ZeroNet homepage in your default browser.



6. Now that it has loaded the front page, it shows that ZeroNet is active and running. So in the browser address bar, copy and paste the address of our site to start downloading it:

The website goes to a grey screen which says it is finding Peers and connections, and downloading a content.json file. It may also ask you to change the site limit to 500MB. Do so. Now ZeroNet starts loading the website onto your computer. You start sending this website to new viewers. The only person who can change the website is the one who controls a Site Private Key (the Ansar Al-Khilafah Team).



Using Tails OS with Persistence, Tor, PGP and Pidgin


Ansar Al-Khilafah Technical Team Presents:

Using Tails OS with Persistence, Tor, PGP and Pidgin – A Two-Part Video

Learn how to use Tails OS and remain anonymous over the internet while leaving no traces of your activity on your PC or Laptop. Learn how to make your activity on your computer forensic-proof, so that if your computer is ever examined, there is no trace of what you did, thereby stopping you from getting into trouble.

Many people have got into trouble because of what they said, however, what got them into real trouble is what was found on their computers, including compromising data, and traces of their internet and reading activities. Learn how to protect yourself from these dangers with this comprehensive guide!

Part 1 of 2:


Part 2 of 2:

How to hide your sensitive data from the authorities

Learn how to use VeraCrypt and securely encrypt your data using strong encryption. This video also teaches you how, in the event that the police demand that you decrypt your encrypted data, allows you to decrypt dummy data using a dummy password, leaving the actual sensitive data hidden. Watch the video and find out more:


NOTE: This is EXTREMELY important to learn and everyone who thinks they have material on their PC which can get them jailed (such as Dabiq/Inspire Magazine), needs to implement this as standard practice.



How to use GPG4USB for secure encrypted communications

What you will get from this guide: 
  • The ability to encrypt files and text messages from wherever you are (for instance, an Internet café or at work).
  • The ability to encrypt the messages off-line or when Internet access is unavailable, and then send them from a computer connected to the Internet later.
  • Sending these encrypted PGP messages through secure Tor-based email channels such as mail2tor, sigaint or whilst connected to the Tor network, thus enjoying the benefit of an anonymous internet connection with the added benefit of encrypted PGP email messages. This doubles your security because the user of the email service is untraceable as you are using Tor, and the messages themselves are encrypted using PGP.

1. Introduction to gpg4usb

1.1 Things You Should Know about gpg4usb Before You Start

gpg4usb is a simple, lightweight and portable program that lets you encrypt and decrypt text messages and files. gpg4usb is based on public-key cryptography. In this method, each individual must generate her/his own personal key pair. The first key is known as the private key. It is protected by a password or passphrase, guarded and never shared with anyone.

The second key is known as the public key. This key can be shared with any of your correspondents – and your correspondents can share theirs with you. Once you have a correspondent’s public key you can begin sending encrypted emails to this person. Only she will be able to decrypt and read your emails, because she is the only person who has access to the matching private key.

Similarly, if you send a copy of your own public key to your email contacts and keep the matching private key secret, only you will be able to read encrypted messages from those contacts.

You may also attach digital signatures to your messages. The recipient of your message who has a genuine copy of your public key will be able to verify that the email comes from you, and that its content was not tampered with on the way. Similarly, if you have a correspondent’s public key, you can verify the digital signatures on her messages.

gpg4usb lets you generate an encryption key pair, export public keys to be shared with other people, compose a text message, and encrypt it. You can either simply copy and paste the public key and/or encrypted message from gpg4usb to the body of your email, or save them as a text file to be sent later. Documents and files can be encrypted too.

Note: Be mindful that the original, unencrypted versions of your documents and files may still reside on your computer, so both your correspondent and yourself must remember to remove them from computers when necessary.

gpg4usb lets you exchange keys and encrypted messages with other similar GPG or PGP programs.

For more information about public key encryption, see Chapter 2.4 Cryptology – Public Key Encryption on page 38 of Digital Security and Privacy for Human Rights Defenders.

2. Install gpg4usb and Generate a Key Pair

2.0 Install gpg4usb

gpg4usb is a portable tool that does not require installation on your computer. The software is disturbed as a zip and should be extracted directly to a USB drive or to a folder on your computer; to begin perform the following steps:

Step 1. Locate the gpg4usb zipped archive file, and then extract all the files to a removable USB drive or a folder on your computer:

Figure 1: The gpg4usb program destination location

2.1 Generate a Key Pair

Before you can begin encrypting and decrypting email, text messages, documents and files, you must take two preparatory steps: first you need to generate or import your encryption key pair and second you need to send your public key to your contacts and receive their public keys and import them to your key ring. We describe how to share public keys on the next page. gpg4usb assist you with generating your key pair on the first start of the program. Note that you can always come back to Getting Started window from the Help -> Open Wizard menu.

Step 1. To run the gpg4usb program for the first time , find and double click to open the gpg4usb folder and then double click . This will activate the Getting Started window. Select a language and click Next.

Step 2. At the Choose your Action screen, click Create a new keypair.

Figure 2: Choose your Action

Note the other options to import existing keys available on the First Start Wizard screen. If upgrading from a previous version of gpg4usb, you can choose import settings and/or keys from gpg4usb. If using Thunderbird with Enigmail, you can choose the option import keys from GnuPG. You can also choose to import keys at a later stage by running the wizard again from the Help -> Open Wizard menu.

Step 3. At the Create a keypair click Create New Key.

Figure 3: Create New Key

Step 4. Enter the appropriate data into the corresponding text fields, so that your own window resembles the following:

Figure 4: An example of a completed Generate Key form


  • Set a secure password to protect your private key (please refer to How to create and maintain secure passwords).
  • We advice that you use expiration date and that you set it to less then 5 years.
  • We strongly recommend that you generate keys of at least 2048 bit size. Key of a larger size is more secure, but also requires more time to create, encrypt and decrypt texts.

Note: You do not need to use your real name and real email address when generating your key. However, using email address of the account you will use to communicate will make it easier for your contacts to associate your key with this account.

Step 6. Click OK to generate the keypair.

Figure 5: Generating a key…

Figure 6: New key created

Step 7. Click OK to come back to the gpg4usb window. After the keypair has been successfully generated, you will see a screen resembling the following:

Figure 7: The gpg4usb window, displaying the newly created key pair

Now that you have successfully created a key pair, you need to learn how to export your public key to share it with other people, and how to import the public keys of your correspondents.

3. Export and Import Keys

3.1 Export Your Public Key

You must send your public key to your correspondent before they can send encrypted messages to you.

To export your public key with gpg4usb, perform the following steps:

Step 1. Double click to open the gpg4usb folder.

Step 2. Double click to open gpg4usb program.

Step3. Click to activate the following screen:

Figure 1: The Keymanagement window displaying all the key pairs

Step 3. Check your own key, as shown in Figure 1 above.

Step 4. Select the Export To File item from the Key menu as shown below:

Figure 2: The Keymanagement window with the Export To File item selected

This will activate the following screen:

Figure 3: The Export To Folder browse window

Step 5. Click to save your key pair to the gpg4usb program folder.

Step 6: Send the exported file with your public key as an attachment to your correspondent.

3.2 Import a Correspondent’s Public Key

Before you can encrypt information and send it to your correspondent, you need to receive and import their public key. To import a correspondent’s Public key using gpg4usb, perform the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Click Import to activate the following screen:

Figure 4: The Import Key dialog box

Step 3. Browse and select the key you wish to import.

Figure 5: Open Key

Step 4. Click Open to activate following window.

Figure 6: Key Import Details

Step 5. Click OK to close above window and come back to gpg4usb main window. It will display newly imported public key as below.

Figure 7: The gpg4usb console displaying the newly imported public key associated with your correspondent’s account

Now that you have successfully imported a correspondent’s public key, you must now verify and sign that imported key.

3.3 Verify a Key Pair

You must verify that the imported key truly belongs to the person who purportedly sent it and then verify it as being authentic. This is an important step that both you and your email contacts should follow for each public key that you receive.

To verify a key pair, perform the following steps:

Step 1. Contact your correspondent through some means of communication other than email.

Note: You may use a telephone, text messages, Voice over Internet Protocol (VoIP) or any other method, but only if you are certain that you are really communicating with the right person. As a result, telephone conversations and face-to-face meetings provide the greatest assurance of the authenticity of a person’s identity, if or when they can be arranged safely.

Step 2. You and your correspondent should verify that the ‘fingerprints’ of the public keys that you have exchanged are the same.

Note: A fingerprint is a unique series of numbers and letters that identifies each key. The fingerprint itself is not a secret, and can be recorded and used for verification later if or when required.

To view the fingerprint of key pairs you have created or public keys you have imported, perform the following steps:

Step 1. Select a key, then right-click it to activate its associated pop-up menu.

Step 2. Select the Show Keydetails item as shown below in Figure 8.

Figure 8: The pop-up menu associated with a correspondent’s key

This will activate the following screen:

Figure 9: The Keydetails window with the key fingerprint on the bottom

Step 3. Compare this fingerprint with the one your correspondent see in her gpg4usb program.

Your correspondent should repeat these steps. Confirm with each other that the fingerprint for the key each of you have exchanged matches the sender’s original. If they don’t match, exchange your public keys again (perhaps over different email address or communication method) and repeat the verification process.

If the fingerprints match each other exactly, then you are ready to securely send encrypted messages and files between each others.

4. Encrypt and Decrypt Text and Files

4.0 Encrypt Text

In the example that follows, Terence will encrypt an email for his friend Salima, using the following steps:

Step 1. Double click to open the gpg4usb console.

Step 2. Compose your message as shown in the example below:

Figure 1: The gpg4usb console displaying an example of a message

Step 3. Check the check box associated with the intended recipient of your email as follows:

Figure 2: The gpg4usb console displaying the intended recipient

Note: You can encrypt a message to more than one recipient by simply checking their corresponding check boxes in the Encrypt for: pane. Also, it may prove useful for your personal records to encrypt that message to yourself, so you can read what you sent later.

Step 4. Either click or select Encrypt from the Crypt menu to encrypt your message as follows:

Figure 3: The gpg4usb console displaying an example of an encrypted message

Step 5. Click to select the entire encrypted message, and then click to copy the message to the clipboard.

Note: Alternatively, you may use the short-cut keys associated with each item in the menu, in this case Ctrl + E will encrypt the message, Ctrl + A will select the entire encrypted message, and Ctrl + C will copy the message to the clipboard.

Step 6. Open your email account and then open a blank message page, and then paste this message so that it resembles the following:

Figure 4: An example of a message encrypted in gpg4usb pasted into a Gmail account email

Note: Rich Text Formats (RTF) can corrupt the encrypted message format; hence, it is better to compose your messages in plain text. To convert RTF into plain text in Gmail simply click More Options and select Plain Text Mode displayed at the foot of the message pane as shown below:

Figure 5: Gmail Format Options

4.1 Decrypt Text

To decrypt an encrypted email, perform the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Open your email account, and then open the message.

Step 3. Select, copy and then paste the encrypted message into the gpg4usb console untitled1.txt tab as follows:

Figure 6: The gpg4usb console displaying a message for decryption

Note: If the encrypted text appears with double line breaks as shown in Figure 7 below, gpg4usb might not be able to automatically decrypt it. To remove these double line breaks, click on (or select Remove double Linebreaks from the Edit menu) to remove them and then continue the decryption process at Step 4.

Figure 7: The gpg4usb console displaying a message for decryption with double linebreaks

Step 4. Click and enter the password you assigned when generating a key pair, as shown in the following screen:

Figure 8: The Enter Password prompt window

Step 5. Click OK to activate a gpg4usb console resembling Figure 2 above.

4.2 Encrypt Files

The process for encrypting a file is similar to encrypting text messages; in the example that follows, Salima will encrypt a file for Terence, using the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Click and Encrypt File to activate the following screen:

Figure 9: The Encrypt File window

The Encrypt File window scroll list (outlined in black) lets you select the email account and corresponding key you will use to encrypt a message to.

Step 3. Click beside Input item to activate the following screen:

Figure 10: The Open File browser window

Step 4. Click to attach the file to be encrypted and return to the Encrypt window as follows:

Figure 11: The Encrypt File window displaying the file designated for encryption

Step 5. Click OK to activate the following screen:

Figure 12: The Done confirmation dialog box

The Done confirmation dialog box shows you where the newly encrypted file resides. An encrypted file can also be identified by either a .asc file extension, for example, Meeting Minutes.doc.asc.

Step 6. Click OK to complete the file encryption process.

Note: You can encrypt a text message you might send along with the encrypted file separately.

Step 7. Using your email account, navigate to the location specified in the Done confirmation dialog box (Figure 12), and then attach the encrypted file to you email as you would any other file.

IMPORTANT: Observe that the name of the file is not encrypted. Make sure that this name does not reveal any important information! Do not forget that an unencrypted version of the file continues to reside on the disk.

4.3 Decrypt Files

In the example that follows, Terence will decrypt the file Salima has sent to him, using the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Open your email account, open the message and download the attached file.

Note: If your correspondent has sent a message accompanying the encrypted file, you may decrypt that message by using the method outlined in the Decrypt Textsection

Step 3. In the gpg4usb console (as shown in Figure 1 above), click and Decrypt File window (as in Figure 13 below).

Step 4. Click beside Input item to browse to the location of the downloaded encrypted file as follows:

Figure 13: The Decrypt window, displaying the path to the encrypted file

Step 5. Click OK to activate the following screen:

Figure 14: The Done confirmation dialog box displaying the location of the decrypted file

Important: If you are working from an internet café or at workstations other people may have access to decrypted version of the file, it is better to copy the .asc file to your USB or portable drive, and take it with you so you may decrypt it in the privacy of your own home.


Q: Does gpg4usb have to be used from USB memory stick?

A: No. It can be extracted to and run from your computer hard disk.

Q: How many accounts may I generate key pairs for?

A: As many as you need.

Q: I like the fact that simple cut-and-paste operations are used here.

A: Indeed. However, don’t forget that your email subject header remain unencrypted. Therefore, be careful and don’t enter a subject title which is descriptive or may give you away potentially!

Registering on twitter without Phone Verification – Part 3

This tutorial shows you how to change some settings in the Tor Browser Bundle so that you end up with a US-based IP address. This will allow you to avoid Twitter phone verification or SMS verification.

1. Download Tor Browser Bundle:

2. Once installed, make sure you run the browser at least once, so that Tor generates a Torrc file.

3. Close the Browser, then navigate to the Tor installation folder. Assuming you are using Windows, and that the installation folder is on the Desktop, navigate to the Torrc file using this route: Browser > TorBrowser > Data > Tor. It should look something like this:

Tor Path

4. Right-Click the “torrc file, and choose “Open With”, and open it up with Notepad. Note: Don’t open with Wordpad, it has to be with Notepad.

5. Once opened, add the text “ExitNodes {US}” (without the inverted commas) above the text. There is only one space between ExitNodes and {US}. It should look like this:

Tor Path 3

Then save the file. Do not choose “Save As…”. Just choose “Save” and then close the file.

6. This now means your IP address in the Tor Browser will always be a US IP Address. You are free to register on Twitter and you won’t be asked to verify through phone or SMS. Please make sure your email was also created anonymously whilst also using Tor.

7. If you need your browser to exit through another countries IP address, you need to replace the {US} with another countries code, such as the United KIngdom, which is {GB}. See this list for all country codes:

8. Note: You are not required to have a single installation of Tor. You can have many installations. One installation can be used for browsing and Twitter activity, the other can be used for specific purposes, such as one for registering with a US IP-address.

Here is an example of this process on YouTube:

Registering on twitter without Phone Verification – Part 2

Ansar Al Khilafah technical Team presents:

Registering on twitter without Phone Verification – Part 2 (using JonDo IP Changer)

See also Registering on twitter without phone varification part 1 and The blocklist tutorial
As discussed in the previous tutorial (see here), Twitter requires you to verify your account using your phone if you are using a non-United States IP-address. This tutorial will allow you to avoid this using the JonDo IP-Changer proxy software (

First download it and install it.

Then when you want to use it, there are two things you have to do.

First open the installation folder and choose the JonDo icon:


What we are doing here is first activating the proxy before we use the anonymous browser. Otherwise you won’t be proxified if you just use the anonymous browser..

This screen this pops up:


At the drop-down box above, choose any option which ends with the USA flag on the right. This means we are making our exit IP-address a US based IP address. Also make sure to click On in the Anonymity box:


Once anonymity has been activated, go back to the installation folder:


And choose JonDoFox Portable. This is the browser you will use to surf anonymously. Once the browser is open, you can check your IP-address to show you are anonymous:



When going to Twitter to register, you will have to do the right-click on the Twitter homepage and allow all scripts in this page on NoScript, otherwise you won’t be able to register. You may have to choose allow scripts twice. This process with NoScript was discussed in the blocklist tutorial (see here)

Once you manage to register (no need to give phone number), you will have to verify through email. Do so as discussed in the first article (see here), and once registered, you can use Tor Browser Bundle as your Twitter anonymous browser instead of JonDo.

I cannot offer guarantees that this is 100% secure, but it is going to take a master-terrorist or a pedophile for the intel agencies to make the effort to uncover you.

Registering on twitter without Phone Verification – Part 1

Ansar Al Khilafah technical Team presents:

Registering on twitter without Phone Verification – Part 1

see also Regestering on twitter without phone varification part 2 and The Blocklist Tutorial

Twitter works on the principle that if your IP address is based outside of the United States, then when registering an account, you will need to provide phone or SMS verification. You can choose not to provide it, but if you do so, Twitter will eventually ask you to provide it, and if not provided then, your account is automatically suspended by their algorithm.

There are a few ways around this if you are outside of the US, or even in the US, and don’t want to use your real IP address.

The first is to use a Proxy VPN which would allow you to select a US-based IP address to register with Twitter. For example, use CyberGhost VPN (, which is free.

After you have installed it and activated it, open up the program. It eventually takes you to a world map. On the bottom-left, choose “Simulated Country”:


Then scroll down this list and choose the USA. The server maybe full, so choose a time when it is not full:


Then proceed to register on Twitter whilst using this USA IP-address. Once registered and confirmed through email, you no longer have to use CyberGhost VPN. You can use Tor Brwoser Bundle.

Remember, make sure your email address was not registered using your real IP address, and make sure it is not one of the big three (Gmail, Yahoo or Microsoft). You can use a Tor-based email such as Mail2Tor (http://mail2tor2zyjdctd.onion), Sigaint (http://sigaintevyh2rzvw.onion/) or ( You should only register for these email services whilst using the Tor Browser Bundle (

There is the inherent danger that if you are a particularly high-value target, that the intel agencies may ask Twitter what IP address was used to first register with Twitter. They will then give over the CyberGhost IP-address used to register. It maybe be possible then for the intel agencies to ask CyberGhost to hand over the real IP address of the person who used their proxy IP address to register with Twitter at that time and on that day. While unlikely, especially if you are a low-value target, keep in mind that this method does not provide 100% anonymity if the intel agencies truly consider you a high-value target.

If you truly think you are under surveillance, then know that VPNs are not secure. According to Der Spiegel:

VPN Security only Virtual

One example is virtual private networks (VPN), which are often used by companies and institutions operating from multiple offices and locations. A VPN theoretically creates a secure tunnel between two points on the Internet. All data is channeled through that tunnel, protected by cryptography. When it comes to the level of privacy offered here, virtual is the right word, too. This is because the NSA operates a large-scale VPN exploitation project to crack large numbers of connections, allowing it to intercept the data exchanged inside the VPN — including, for example, the Greek government’s use of VPNs. The team responsible for the exploitation of those Greek VPN communications consisted of 12 people, according to an NSA document SPIEGEL has seen.

The NSA also targeted SecurityKiss, a VPN service in Ireland. The following fingerprint for Xkeyscore, the agency’s powerful spying tool, was reported to be tested and working against the service:

fingerprint(‘encryption/securitykiss/x509’) = $pkcs and ( ($tcp and from_port(443)) or ($udp and (from_port(123) or from_por (5000) or from_port(5353)) ) ) and (not (ip_subnet(‘’ or ‘’ or ‘’ )) ) and ‘RSA Generated Server Certificate’c and ‘Dublin1’c and ‘GL CA’c;

According to an NSA document dating from late 2009, the agency was processing 1,000 requests an hour to decrypt VPN connections. This number was expected to increase to 100,000 per hour by the end of 2011. The aim was for the system to be able to completely process “at least 20 percent” of these requests, meaning the data traffic would have to be decrypted and reinjected. In other words, by the end of 2011, the NSA’s plans called for simultaneously surveilling 20,000 supposedly secure VPN communications per hour.

VPN connections can be based on a number of different protocols. The most widely used ones are called Point-to-Point Tunneling Protocol (PPTP) and Internet Protocol Security (Ipsec). Both seem to pose few problems for the NSA spies if they really want to crack a connection. Experts have considered PPTP insecure for some time now, but it is still in use in many commercial systems. The authors of one NSA presentation boast of a project called FOURSCORE that stores information including decrypted PPTP VPN metadata.

Using a number of different programs, they claim to have succeeded in penetrating numerous networks. Among those surveilled were the Russian carrier Transaero Airlines, Royal Jordanian Airlines as well as Moscow-based telecommunications firm Mir Telematiki. Another success touted is the NSA’s surveillance of the internal communications of diplomats and government officials from Afghanistan, Pakistan and Turkey.

Ipsec as a protocol seems to create slightly more trouble for the spies. But the NSA has the resources to actively attack routers involved in the communication process to get to the keys to unlock the encryption rather than trying to break it, courtesy of the unit called Tailored Access Operations: “TAO got on the router through which banking traffic of interest flows,” it says in one presentation.

So if you are under surveilance, there is a chance that your VPN connection can be decrypted while you are using it. Their systems can automatically detect when you are using a VPN and then hijack it. So if you are under surveilance, do not use this method.

This danger does not apply to registering with the email services I mentioned as you registered with them through Tor, which as of our current understanding, is secure.

The Blocklist Tutorial

Ansar Al Khilafah technical Team presents:

The Blocklist Tutorial

see also Registering on twitter without phone varification (part 1 and part 2)

So here is a long list of people to block. Unfortunately some genuine Muslims may have been caught up in the blocklist, so if you do see a genuine one, please feel free to unblock him.

The criteria for blocking a Muslim is either if his account was following the major spammers which are taking down pro-Baqiyah accounts, or that he is in some way affiliated or supports enemies of the Khilafah.

So if you are a genuine Muslim who followed the spammer accounts, make sure to unfollow them so that you do not get looked at with suspicion.

To get started, log into you Twitter account.

Then paste this URL into your browser:

Click on “Block All and Subscribe”.


If you are using the Tor Browser Bundle, then for it to work, you will need to press right click on your mouse anywhere on the screen, choose NoScript from the bottom, and then choose “Temporarily Allow All this Page”. This will allow the script-based button to actually work:


After you allow the script and then click on “Block All and Subscribe”, you will get the following screen asking you to authorise your account to use this Twitter app:


Choose “Sign In”. You will then be sent to this screen:


You are now subscribed to the blocklist. Everytime the owner of the blocklist blocks someone, your account will automatically block the account as well.

Blocking thousands of accounts takes a few hours. So everyone won’t be blocked instantly. But you can still browse or logoff from twitter while this blocking takes place, so as long as you don’t lock your account during this process.

Step By Step Guide in Evading Phone Verification on Any Website

Lets Start Step by Step:

1) First go to this Website


2) Copy any one number and paste it where they are asking SMS Verification.



3) Simply come back and click the number which you have selected, check it out there is your code sent by twitter, google, youtube or whatever else.


4.Enter The verification code given for your number on your account.



Always Use Tor when opening and accessing your accounts for maximum safety and security.