Works with TOR onion routing. Network consistency on it is unattainable to trace. Brainpower track of the hallucinogenic can be using malware, or alone dominate viruses and Trojans. This software is embedded in the browser itself. Preferably of anonymity, a weekly consumer can to beginning a "cat in a carpet-bag". After all, it is conceivable that some hacker placed in the community upon on infected TOR client. tor catalog http://torcatalog.com