Our flagship software designed to protect your privacy.
Here at SafeHaven Software™, we understand that there is a often a misconception that your privacy is no longer guaranteed.
Doubly-true, with an ever-changing and rapidly evolving rate of technology that is aimed at delivering more personalized adverts to you,
and detailed reports of your usage back to the developers.
While it is a fact that privacy has changed from what we once knew - and it is much harder to obtain now than ever before.
Whatever the situation might be - connecting to a public Wi-Fi network at your local coffee shop or library, administering your own network, or accessing a specific network at work or at school - We've got you covered.
Our tools and intuitive products will assist in ensuring your privacy remains just that...private!
We strive to beat competition by offering more features in each of our products.
When it comes to web based technologies we have the best spoofing technology available.
Whether you are a one click user or power user you will find our tools offer the best get up and go startups.
We offer the best no-problem licences..by that we mean, our licencing structure is laid back and chill so you don't have to worry!
All of our tools get frequent updates. Automatic in most cases. That means all you do is start the tool and it'll do the rest to stay up to date.
We offer 24x7 support. In most cases we can be reached via eMail, webform, in-app, on forum
Designed with the bleeding edge technology available today (Not yesteryear - unlike our competitors!)
Our flagship software designed to protect your privacy.
Q: How does the kill switch function? Why does this help?
A: Applications added here will be automatically closed during a VPN or general network failure. This will attempt to stop any leakage of your DNS by communicating software and other services, acting as a superior first line of defense.
Q: Why is my MAC address important?
A: Virtually every OS on the market today is capable of communicating over Ethernet networks and has the ability to set the MAC address of its NIC. The default MAC address of a NIC, in most cases, is “burned” into the card, but that address can be overridden by software. It is unfortunately not known or common knowledge that your MAC address can be changed or set. Many users are using the manufacturer's hard-coded MAC address by default, never having changed it.
Q: Why do you need to change your MAC address?
A: Well, a very important reason is privacy. Just like an IP address is your ID on the internet, a MAC address is your ID on the local Ethernet network. Recently, as the rise of mobile networks, with Wi-Fi & Bluetooth hotspots everywhere, the privacy implications of MAC address tracking have been the subject of increasing debate. You can visit the following links for more information; http://www.wired.com/2014/08/edward-snowden/ http://destroyadware.com/internet-privacy-software-reviews/why-and-how-to-change-mac-address/
Q: Why is my Hostname important?
A: This name, just like your computer name are given to you by your computer manufacturer or set by yourself during installation of your OS. This information can be personally revealing, as most people like to personally name their computers to make it all the more your own. Unfortunately, a computer name such as John-PC or Mike-Home can narrow down an attackers search, or enlighten them to further attack such as blackmail or being 'doxed'. You may visit the following links for more information; http://whatismyipaddress.com/hostname
Q: Why is my Computer name important?
A: For the same reason as your Hostname, privacy is of the essence here. There are numerous exploits and normal everyday functions on the web today that will attempt to grab your computer name or hostname's to personalize their content towards you, possibly even greeting you by the name of your computer on your next return. These bits of personally identifiable information can add up quickly and assist attackers or marketing and advertisement firms from building a digital fingerprint of your computer and the user using it.
Q: Why is my NetBIOS important?
A: A computer's NetBIOS name is more often than not, the exact same as the computer's Hostname, though it does not by any means have to. When a computer is started, various services (such as the server service or the workstation service) register a unique NetBIOS name based on the computer name. As with the hostname, this information can be supplemented to assist in building a computer's digital fingerprint. http://www.tech-faq.com/netbios-names.html
Q: What is the VPN Detection option for?
A: This will simply check for connected VPN adapters on your network to identify whether you are connected to a VPN or not. This process will aid in serving you content such as DNS servers, adding websites to your exclusion lists, and more. You may also find a ping function to allow you to test the speed of how long your network takes to communicate between a website.
Q: What is the VPN Bypass option for?
A: Frequently I have seen it asked online; "How can I visit 'x' site whilst connected to a VPN, but using my regular IP address instead?" This is a very handy feature that allows for users to visit a website that they may be blocked or banned from accessing on their VPN server. With this feature, Websites get resolved to their IP addresses, and then are simply re-routed from your VPN IP address towards your main connection IP address instead.
Q: What is the DNS Leak Fix option for?
A: Your ISP provides you with a DNS server that is automatically configured on your router, which in turn applies this ISP owned DNS server to any device connected to your network. Your ISP's DNS server can be restored at any time by logging into your authorized router or modem device. This feature will grant you access to 5 premium DNS servers that have been included with the software to offer greater diversity and functionality. You may also choose to set your own DNS servers. Using DNS servers has many different reasons and their own set of pro's and con's, but the main purpose is that they can ultimately serve different uses. Some DNS servers are set up specifically to help block spam or ads, while others may block pornography and other gray-areas of the web entirely! Depending on the DNS servers used, generally network speeds can increase or decrease, with or without added functionality.
Q: What is the Quick Repair option for?
A: Quick Repair will, as it says, quickly use the Windows based diagnostic tools in the background to reset and flush your network connection. This can be used to troubleshoot problems such as a DNS server failure, VPN server failure, or a temporary weakness or drop in signal.
Q: What's with the Install/Uninstall Win TAP?!
A: Don't be alarmed. These drivers are essential when connecting to most VPN's using the OpenVPN protocol - so you might even have this already. You will not need to use these options unless something seems to be wrong with your VPN client or configuration files. This can happen for a number of reasons, including recently installed software and updates. Whilst this option will provide you with the latest TAP drivers, it is often best to do a complete uninstall, removing traces of the OpenVPN software and rebooting before proceeding to reinstall OpenVPN.
Q: What is the Disable WebRTC option for?
A: WebRTC is a designed protocol online that has served to provide support for real-time and browser-to-browser applications for voice calling, video chat, P2P file sharing and other services. Specifically, when behind a VPN service, WebRTC has a habit of revealing the users actual IP address. A quick-fix solution, WebRTC block will take effect on as many browsers as possible.
Q: What is the Clear System Logs option for?
A: These are logs that are created by your system for diagnostic, administrative and security purposes. Most machines will never have cleared this information, leaving logs back from day 1 of installation, or your purchase date. In establishing a digital fingerprint, these logs would prove that you installed specific software, performed actions, experienced software or network crashes, BSOD's, error codes and other information. For what exactly can determined from these logs, feel free to check out your "Event Viewer".
Q: What are the main settings for?
A: This page will allow you to use the Machine tab automatically, every time your computer starts. This will ensure that you have the most secure possible experience, by using a new ID (Hostname, Computer name, NetBIOS and MAC) to give the user the anonymity they deserve.
Q: What is the chart for, and what is it monitoring?
A: This graph has been designed to display and monitor the bandwidth flow through your connected network. With monitoring, you are able to determine how much data is being used up each day, week or month. This is particularly useful for customers with ISP's that restrict their bandwidth to a monthly limit, monitoring their bandwidth will allow the user to pace themselves or keep from going over - and spending more money on their bill then they need to.
Q: What are the Main Settings for?
A: These settings will allow the user to automate their task, having a new computer ID (MAC address, Hostname, Computer name, and NetBIOS) randomized each time the computer starts up, giving you a superb line of defense by changing this vital and private information. Your computer ID is extremely important to privacy; and security. Wi-Fi attackers will need your MAC address and other information to perform their attacks correctly and efficiently. This combination of security improvements makes it a lot harder, if not impossible, to efficiently gain access to your network or machine. These main settings now also include some important and powerful features to aid in your tasks as well as removing possible traces of fingerprinting.
Q: What are custom user-agents?
A: Every time your web browser makes a request to a website, it sends a HTTP Header called the "User Agent". The User Agent string contains information about your web browser name, operating system, device type and lots of other useful bits of information. But every browser sends its user agent in a different format, so decoding them can be very tricky. However, analyzing this information can provide many key fingerprinting elements to an investigator or individual attempting to discover more information. Masking your user-agent with a new one, or rather, a more popularly used one can greatly benefit your privacy. Like Tor, it would be ideal if everyone had the same information, making it harder to trace a specific users actions. Here is an example of a user-agent, and it's detected browser and operating system information. "Mozilla/5.0 (Linux; Android 4.1.1; Nexus 7 Build/JRO03D) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166 Safari/535.19" - Chrome 18 on Android (Jelly Bean) Asus Nexus 7
Q: What is WebGL, should I have it enabled or disabled?
A: WebGL brings hardware accelerated 3D graphics to the browsers without need of installing additional software. Unfortunately there is always a trade off when considering convenience over security. WebGL relies on a fingerprint of it's own design to function properly and deliver users specific and customized content. Because of that, it doesn't take into account the fact that WebGL can be used to identify an individual system with nearly 100% accuracy, effectively bringing your anonymity set down to exactly one individual: you. The same is true for techniques such as AudioContext fingerprinting, which Panopticlick likewise does not use. This behavior results in the site mistakenly concluding the disabling WebGL decreases your anonymity set. Browser fingerprinting is a complex topic, and no one service can tell you exactly how unique your system is. Currently, the most effective way to mitigate browser fingerprinting is to use the Tor Browser, which strives to have a uniform fingerprint among all its users. It will disable features that can potentially allow cross-browser fingerprinting, such as AudioContext fingerprinting and WebGL fingerprinting. It is highly recommended to have it disabled, or to use Tor.
Q: What is canvas-fingerprinting?
Q: What is the custom browser for?
End-User License Agreement (EULA) of Absolution
This End-User License Agreement ("EULA") is a legal agreement between you and SafeHaven Software™. Our EULA was created by EULA Template for Absolution.
This EULA agreement governs your acquisition and use of our Absolution software ("Software") directly from SafeHaven Software™ or indirectly through a SafeHaven Software™ authorized reseller or distributor (a "Reseller").
Please read this EULA agreement carefully before completing the installation process and using the Absolution software. It provides a license to use the Absolution software and contains warranty information and liability disclaimers.
If you register for a free trial of the Absolution software, this EULA agreement will also govern that trial. By clicking "accept" or installing and/or using the Absolution software, you are confirming your acceptance of the Software and agreeing to become bound by the terms of this EULA agreement.
If you are entering into this EULA agreement on behalf of a company or other legal entity, you represent that you have the authority to bind such entity and its affiliates to these terms and conditions. If you do not have such authority or if you do not agree with the terms and conditions of this EULA agreement, do not install or use the Software, and you must not accept this EULA agreement.
This EULA agreement shall apply only to the Software supplied by SafeHaven Software™ herewith regardless of whether other software is referred to or described herein. The terms also apply to any SafeHaven Software™ updates, supplements, Internet-based services, and support services for the Software, unless other terms accompany those items on delivery. If so, those terms apply.
SafeHaven Software™ hereby grants you a personal, non-transferable, non-exclusive licence to use the Absolution software on your devices in accordance with the terms of this EULA agreement.
You are permitted to load the Absolution software (for example a PC, laptop, mobile or tablet) under your control. You are responsible for ensuring your device meets the minimum requirements of the Absolution software.
You are not permitted to:
Edit, alter, modify, adapt, translate or otherwise change the whole or any part of the Software nor permit the whole or any part of the Software to be combined with or become incorporated in any other software, nor decompile, disassemble or reverse engineer the Software or attempt to do any such things Reproduce, copy, distribute, resell or otherwise use the Software for any commercial purpose Allow any third party to use the Software on behalf of or for the benefit of any third party Use the Software in any way which breaches any applicable local, national or international law use the Software for any purpose that SafeHaven Software™ considers is a breach of this EULA agreement Intellectual Property and Ownership
SafeHaven Software™ shall at all times retain ownership of the Software as originally downloaded by you and all subsequent downloads of the Software by you. The Software (and the copyright, and other intellectual property rights of whatever nature in the Software, including any modifications made thereto) are and shall remain the property of SafeHaven Software™.
SafeHaven Software™ reserves the right to grant licences to use the Software to third parties.
This EULA agreement is effective from the date you first use the Software and shall continue until terminated. You may terminate it at any time upon written notice to SafeHaven Software™.
It will also terminate immediately if you fail to comply with any term of this EULA agreement. Upon such termination, the licenses granted by this EULA agreement will immediately terminate and you agree to stop all access and use of the Software. The provisions that by their nature continue and survive will survive any termination of this EULA agreement.
This EULA agreement, and any dispute arising out of or in connection with this EULA agreement, shall be governed by and construed in accordance with the laws of ca.