www.safehaven.cf Open in urlscan Pro
52.229.88.238  Public Scan

URL: https://www.safehaven.cf/
Submission: On October 11 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST #

<form method="post" action="#">
  <div class="fields">
    <div class="field half">
      <label for="name">Name</label>
      <input type="text" name="name" id="name">
    </div>
    <div class="field half">
      <label for="email">Email</label>
      <input type="text" name="email" id="email">
    </div>
    <div class="field">
      <label for="message">Message</label>
      <textarea name="message" id="message" rows="5"></textarea>
    </div>
  </div>
  <ul class="actions">
    <li><a href="" class="button submit">Send Message</a></li>
  </ul>
</form>

Text Content

 * Welcome
 * Our Mission
 * Our Software
 * FAQ & TOS
 * Get in touch


OUR MISSION

Here at SafeHaven Software™, we understand that there is a often a misconception
that your privacy is no longer guaranteed. Doubly-true, with an ever-changing
and rapidly evolving rate of technology that is aimed at delivering more
personalized adverts to you, and detailed reports of your usage back to the
developers.
While it is a fact that privacy has changed from what we once knew - and it is
much harder to obtain now than ever before.
Whatever the situation might be - connecting to a public Wi-Fi network at your
local coffee shop or library, administering your own network, or accessing a
specific network at work or at school - We've got you covered.

Our tools and intuitive products will assist in ensuring your privacy remains
just that...private!


ALL IN ONE SOLUTIONS

We strive to beat competition by offering more features in each of our products.


THE BEST SPOOFING ENGINE

When it comes to web based technologies we have the best spoofing technology
available.


AUTOMATIC AND MANUAL CONFIGURATION

Whether you are a one click user or power user you will find our tools offer the
best get up and go startups.


NO-PROBLEM LICENCING

We offer the best no-problem licences..by that we mean, our licencing structure
is laid back and chill so you don't have to worry!


FREQUENT UPDATES

All of our tools get frequent updates. Automatic in most cases. That means all
you do is start the tool and it'll do the rest to stay up to date.


SUPPORT

We offer 24x7 support. In most cases we can be reached via eMail, webform,
in-app, on forum

 * Learn more


OUR SOFTWARE

Designed with the bleeding edge technology available today (Not yesteryear -
unlike our competitors!)


ABSOLUTION

Our flagship software designed to protect your privacy.

 * Purchase


PROXY SCANNER



Http and Https Proxies Socks 4 & 5 Proxies SSL Proxies The ability to export,
save, import, etc. Categorically presented in anonymity level and speed Produce
quick and easy results Harvest data from URL's Scrape Proxies from them Scan
Proxies to create list Export to a list, or scan right away



* Purchase


IMAGE SCRAPER



 * Purchase


FREQUENTLY ASKED QUESTIONS

Q: How does the kill switch function? Why does this help?
A: Applications added here will be automatically closed during a VPN or general
network failure. This will attempt to stop any leakage of your DNS by
communicating software and other services, acting as a superior first line of
defense.
---------

Q: Why is my MAC address important?
A: Virtually every OS on the market today is capable of communicating over
Ethernet networks and has the ability to set the MAC address of its NIC. The
default MAC address of a NIC, in most cases, is “burned” into the card, but that
address can be overridden by software. It is unfortunately not known or common
knowledge that your MAC address can be changed or set. Many users are using the
manufacturer's hard-coded MAC address by default, never having changed it.

Q: Why do you need to change your MAC address?
A: Well, a very important reason is privacy. Just like an IP address is your ID
on the internet, a MAC address is your ID on the local Ethernet network.
Recently, as the rise of mobile networks, with Wi-Fi & Bluetooth hotspots
everywhere, the privacy implications of MAC address tracking have been the
subject of increasing debate. You can visit the following links for more
information; http://www.wired.com/2014/08/edward-snowden/
http://destroyadware.com/internet-privacy-software-reviews/why-and-how-to-change-mac-address/

---------
Q: Why is my Hostname important?
A: This name, just like your computer name are given to you by your computer
manufacturer or set by yourself during installation of your OS. This information
can be personally revealing, as most people like to personally name their
computers to make it all the more your own. Unfortunately, a computer name such
as John-PC or Mike-Home can narrow down an attackers search, or enlighten them
to further attack such as blackmail or being 'doxed'. You may visit the
following links for more information; http://whatismyipaddress.com/hostname

---------
Q: Why is my Computer name important?
A: For the same reason as your Hostname, privacy is of the essence here. There
are numerous exploits and normal everyday functions on the web today that will
attempt to grab your computer name or hostname's to personalize their content
towards you, possibly even greeting you by the name of your computer on your
next return. These bits of personally identifiable information can add up
quickly and assist attackers or marketing and advertisement firms from building
a digital fingerprint of your computer and the user using it.

---------
Q: Why is my NetBIOS important?
A: A computer's NetBIOS name is more often than not, the exact same as the
computer's Hostname, though it does not by any means have to. When a computer is
started, various services (such as the server service or the workstation
service) register a unique NetBIOS name based on the computer name. As with the
hostname, this information can be supplemented to assist in building a
computer's digital fingerprint. http://www.tech-faq.com/netbios-names.html

---------
Q: What is the VPN Detection option for?
A: This will simply check for connected VPN adapters on your network to identify
whether you are connected to a VPN or not. This process will aid in serving you
content such as DNS servers, adding websites to your exclusion lists, and more.
You may also find a ping function to allow you to test the speed of how long
your network takes to communicate between a website.

---------
Q: What is the VPN Bypass option for?
A: Frequently I have seen it asked online; "How can I visit 'x' site whilst
connected to a VPN, but using my regular IP address instead?" This is a very
handy feature that allows for users to visit a website that they may be blocked
or banned from accessing on their VPN server. With this feature, Websites get
resolved to their IP addresses, and then are simply re-routed from your VPN IP
address towards your main connection IP address instead.

---------
Q: What is the DNS Leak Fix option for?
A: Your ISP provides you with a DNS server that is automatically configured on
your router, which in turn applies this ISP owned DNS server to any device
connected to your network. Your ISP's DNS server can be restored at any time by
logging into your authorized router or modem device. This feature will grant you
access to 5 premium DNS servers that have been included with the software to
offer greater diversity and functionality. You may also choose to set your own
DNS servers. Using DNS servers has many different reasons and their own set of
pro's and con's, but the main purpose is that they can ultimately serve
different uses. Some DNS servers are set up specifically to help block spam or
ads, while others may block pornography and other gray-areas of the web
entirely! Depending on the DNS servers used, generally network speeds can
increase or decrease, with or without added functionality.
---------
Q: What is the Quick Repair option for?
A: Quick Repair will, as it says, quickly use the Windows based diagnostic tools
in the background to reset and flush your network connection. This can be used
to troubleshoot problems such as a DNS server failure, VPN server failure, or a
temporary weakness or drop in signal.

---------
Q: What's with the Install/Uninstall Win TAP?!
A: Don't be alarmed. These drivers are essential when connecting to most VPN's
using the OpenVPN protocol - so you might even have this already. You will not
need to use these options unless something seems to be wrong with your VPN
client or configuration files. This can happen for a number of reasons,
including recently installed software and updates. Whilst this option will
provide you with the latest TAP drivers, it is often best to do a complete
uninstall, removing traces of the OpenVPN software and rebooting before
proceeding to reinstall OpenVPN.

---------
Q: What is the Disable WebRTC option for?
A: WebRTC is a designed protocol online that has served to provide support for
real-time and browser-to-browser applications for voice calling, video chat, P2P
file sharing and other services. Specifically, when behind a VPN service, WebRTC
has a habit of revealing the users actual IP address. A quick-fix solution,
WebRTC block will take effect on as many browsers as possible.

---------
Q: What is the Clear System Logs option for?
A: These are logs that are created by your system for diagnostic, administrative
and security purposes. Most machines will never have cleared this information,
leaving logs back from day 1 of installation, or your purchase date. In
establishing a digital fingerprint, these logs would prove that you installed
specific software, performed actions, experienced software or network crashes,
BSOD's, error codes and other information. For what exactly can determined from
these logs, feel free to check out your "Event Viewer".

---------
Q: What are the main settings for?
A: This page will allow you to use the Machine tab automatically, every time
your computer starts. This will ensure that you have the most secure possible
experience, by using a new ID (Hostname, Computer name, NetBIOS and MAC) to give
the user the anonymity they deserve.

---------
Q: What is the chart for, and what is it monitoring?
A: This graph has been designed to display and monitor the bandwidth flow
through your connected network. With monitoring, you are able to determine how
much data is being used up each day, week or month. This is particularly useful
for customers with ISP's that restrict their bandwidth to a monthly limit,
monitoring their bandwidth will allow the user to pace themselves or keep from
going over - and spending more money on their bill then they need to.

---------
Q: What are the Main Settings for?
A: These settings will allow the user to automate their task, having a new
computer ID (MAC address, Hostname, Computer name, and NetBIOS) randomized each
time the computer starts up, giving you a superb line of defense by changing
this vital and private information. Your computer ID is extremely important to
privacy; and security. Wi-Fi attackers will need your MAC address and other
information to perform their attacks correctly and efficiently. This combination
of security improvements makes it a lot harder, if not impossible, to
efficiently gain access to your network or machine. These main settings now also
include some important and powerful features to aid in your tasks as well as
removing possible traces of fingerprinting.

---------
Q: What are custom user-agents?
A: Every time your web browser makes a request to a website, it sends a HTTP
Header called the "User Agent". The User Agent string contains information about
your web browser name, operating system, device type and lots of other useful
bits of information. But every browser sends its user agent in a different
format, so decoding them can be very tricky. However, analyzing this information
can provide many key fingerprinting elements to an investigator or individual
attempting to discover more information. Masking your user-agent with a new one,
or rather, a more popularly used one can greatly benefit your privacy. Like Tor,
it would be ideal if everyone had the same information, making it harder to
trace a specific users actions. Here is an example of a user-agent, and it's
detected browser and operating system information. "Mozilla/5.0 (Linux; Android
4.1.1; Nexus 7 Build/JRO03D) AppleWebKit/535.19 (KHTML, like Gecko)
Chrome/18.0.1025.166 Safari/535.19" - Chrome 18 on Android (Jelly Bean) Asus
Nexus 7

---------
Q: What is WebGL, should I have it enabled or disabled?
A: WebGL brings hardware accelerated 3D graphics to the browsers without need of
installing additional software. Unfortunately there is always a trade off when
considering convenience over security. WebGL relies on a fingerprint of it's own
design to function properly and deliver users specific and customized content.
Because of that, it doesn't take into account the fact that WebGL can be used to
identify an individual system with nearly 100% accuracy, effectively bringing
your anonymity set down to exactly one individual: you. The same is true for
techniques such as AudioContext fingerprinting, which Panopticlick likewise does
not use. This behavior results in the site mistakenly concluding the disabling
WebGL decreases your anonymity set. Browser fingerprinting is a complex topic,
and no one service can tell you exactly how unique your system is. Currently,
the most effective way to mitigate browser fingerprinting is to use the Tor
Browser, which strives to have a uniform fingerprint among all its users. It
will disable features that can potentially allow cross-browser fingerprinting,
such as AudioContext fingerprinting and WebGL fingerprinting. It is highly
recommended to have it disabled, or to use Tor.

---------
Q: What is canvas-fingerprinting?
A: Canvas is an HTML5 API which is used to draw graphics and animations on a web
page via scripting in JavaScript. But apart from this, canvas can be used as
additional entropy in web-browser's fingerprinting and used for online tracking
purposes. The technique is based on the fact that the same canvas image may be
rendered differently in different computers. This happens for several reasons.
At the image format level – web browsers uses different image processing
engines, image export options, compression level, the final images may got
different checksum even if they are pixel-identical. At the system level –
operating systems have different fonts, they use different algorithms and
settings for anti-aliasing and sub-pixel rendering.

---------
Q: What is the custom browser for?
A: The custom browser is designed to allow and accomodate any and all custom
user-agent strings, if you require them or wish to use them. There are over 10
built in options available, and instructions on acquiring more are outlined
within the User-agent tab of the program. The browser can also connect with Tor,
as well as having additional security measures installed which can aid in
disabling Javascript fingerprinting as well as WebGL.

End-User License Agreement (EULA) of Absolution
This End-User License Agreement ("EULA") is a legal agreement between you and
SafeHaven Software™. Our EULA was created by EULA Template for Absolution.
This EULA agreement governs your acquisition and use of our Absolution software
("Software") directly from SafeHaven Software™ or indirectly through a SafeHaven
Software™ authorized reseller or distributor (a "Reseller").
Please read this EULA agreement carefully before completing the installation
process and using the Absolution software. It provides a license to use the
Absolution software and contains warranty information and liability disclaimers.
If you register for a free trial of the Absolution software, this EULA agreement
will also govern that trial. By clicking "accept" or installing and/or using the
Absolution software, you are confirming your acceptance of the Software and
agreeing to become bound by the terms of this EULA agreement.
If you are entering into this EULA agreement on behalf of a company or other
legal entity, you represent that you have the authority to bind such entity and
its affiliates to these terms and conditions. If you do not have such authority
or if you do not agree with the terms and conditions of this EULA agreement, do
not install or use the Software, and you must not accept this EULA agreement.
This EULA agreement shall apply only to the Software supplied by SafeHaven
Software™ herewith regardless of whether other software is referred to or
described herein. The terms also apply to any SafeHaven Software™ updates,
supplements, Internet-based services, and support services for the Software,
unless other terms accompany those items on delivery. If so, those terms apply.
License Grant
SafeHaven Software™ hereby grants you a personal, non-transferable,
non-exclusive licence to use the Absolution software on your devices in
accordance with the terms of this EULA agreement.
You are permitted to load the Absolution software (for example a PC, laptop,
mobile or tablet) under your control. You are responsible for ensuring your
device meets the minimum requirements of the Absolution software.
You are not permitted to:
Edit, alter, modify, adapt, translate or otherwise change the whole or any part
of the Software nor permit the whole or any part of the Software to be combined
with or become incorporated in any other software, nor decompile, disassemble or
reverse engineer the Software or attempt to do any such things Reproduce, copy,
distribute, resell or otherwise use the Software for any commercial purpose
Allow any third party to use the Software on behalf of or for the benefit of any
third party Use the Software in any way which breaches any applicable local,
national or international law use the Software for any purpose that SafeHaven
Software™ considers is a breach of this EULA agreement Intellectual Property and
Ownership
SafeHaven Software™ shall at all times retain ownership of the Software as
originally downloaded by you and all subsequent downloads of the Software by
you. The Software (and the copyright, and other intellectual property rights of
whatever nature in the Software, including any modifications made thereto) are
and shall remain the property of SafeHaven Software™.
SafeHaven Software™ reserves the right to grant licences to use the Software to
third parties.
Termination
This EULA agreement is effective from the date you first use the Software and
shall continue until terminated. You may terminate it at any time upon written
notice to SafeHaven Software™.
It will also terminate immediately if you fail to comply with any term of this
EULA agreement. Upon such termination, the licenses granted by this EULA
agreement will immediately terminate and you agree to stop all access and use of
the Software. The provisions that by their nature continue and survive will
survive any termination of this EULA agreement.
Governing Law
This EULA agreement, and any dispute arising out of or in connection with this
EULA agreement, shall be governed by and construed in accordance with the laws
of ca.



GET IN TOUCH



Name
Email
Message
 * Send Message


 * EMAIL
   
   info@safehavensoftware.com


 * FORUMS


 * SOCIAL
   
   * Twitter
   * Facebook
   * GitHub
   * Instagram
   * LinkedIn

 * © Safehaven Software. All rights reserved.