Exodus Flaw Leaked and Used to Unmask a Tor-Based Child Exploitation Site

Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.
A computer screen shows details of Tor main page on its web site. Selective focus.

Tor Browser 8.0a9 Released

The Onion Router is the full form of what is more popularly known as the Tor browser. The reference to onion is not without...
tor-project-new-board-members-announced

Tor Project Appoints New Board of Directors

After Jacob Appelbaum resigned following allegations of sexual abuse against him, the Tor Project recently announced its new board of directors. The non-profit digital privacy group formed a new board and before stepping down and handing over the baton, the existing board members said that it was their responsibility to ensure that a competent leadership was at the helm of affairs as the Project moved into its second decade of existence.

Tor Project Developer Stepped Down From His Position

Thirty-three-year-old Jacob Appelbaum, a prominent developer with Tor Project developer and privacy activist, has resigned from his position on the board on May 25, according to reports.Tor announced his departure through a blog post without giving any reasons.

Tor Browser 7.0 Has Now Been Released

The latest iteration of the Tor Browser series is now released, joined by a wealth of new features exciting for users.Earlier this month, Tor...
tor alpha

Latest Tor Alpha Release Includes New Traffic Scheduler

The most recent Tor Alpha release comes with a new element that seeks to address traffic congestion within the Tor network.This latest edition includes...

OpenBazaar To Enhance Users’ Anonymity with Tor Integration

OpenBazaar is an online marketplace that is introducing a new approach to its e-commerce platform. Unlike the typical centralized service marketplaces like eBay, OpenBazaar...

Protesters Asks Users Not To Use Tor on September 1

A group has called for a full-day shutdown of the Tor network as a mark of protest against two issues: handling of sexual misconduct accusations against Jacob Appelbaum and rumor that project might employ former government agents.

Recent Spike In Tor Hidden Services

Tor has become something of a hot debate lately. A security expert has spotted an unprecedented surge in the number of Tor hidden addresses...
Breaking into Corporate Data Servers

Update Now – Critical TorMoil Vulnerability Found in Tor Browser

After recent revelations that the Tor browser was not as secure as users had previously thought, many cynics came out to say, “I told...
Email mobile phone notifications vector illustration, flat cartoon smartphone with read and unread inbox messages, concept of mail on cellphone

Tor Project Discontinues Supporting Tor Messenger

Developers from the Tor Project announced plans to cease working on the Tor Messenger after two and a half years of failed attempts to...

How NSA Tracks All German Tor Users as ‘Extremists’

The NSA has been revealed to mark and consider potential "extremists" all users of the internet anonymizer service Tor.Among those are hundreds of thousands...

What are Some of the Different Ways of Using Tor?

The Tor network, the brainchild of the Tor Project, has grown to become the most popular and effective anonymity tool since its conception.
Malicious Tor Nodes Spying On Darknet Sites

Malicious Tor Nodes Spying On Darknet Sites

The Tor Project, developed since 2006, has made the open network fully featured Tor browser available on virtually every platform for anyone wanting utmost privacy protection. However, the entire Tor network cannot be deemed safe just like the internet in general.

What is TorFlow?

The number of users on Tor has been growing substantially bigger over the last couple of years. It is not very difficult to understand why. Tor stands for anonymous web browsing - a method that largely enhances each user’s cyber security and privacy. This networking protocol will make any data relayed across several servers unidentifiable.
Cropped photo of FBI agent in action with a pistol, rear view

Latest Ruling: FBI Does Not Have To Reveal Tor Exploit Code

Last February, federal judge’s ruling was for the FBI to reveal the full source code they utilized in the Tor exploit to hack and...

Tor Browser 8.0.5 Released

The Tor Project, the organization behind the Tor Browser, announced a new updated release for the software last week.Tor Browser 8.0.5 was officially introduced...

University That Attacked Tor Continues Its Activity On The Network

Several months ago two Internet security researchers from Carnegie Mellon University, Alexander Volynkin and Michael McCord, infiltrated the Dark Web system by directly attacking Tor. This is the software that allows users to browse the net secretively without detection of their IP addresses.

Zerodium Offers $1M for Tor Browser Zero-Day Exploits

Zerodium has made a new announcement that it will offer a huge sum for zero-days exploits on the Tor browser platform, and the amount...

DOJ Dismisses Playpen Case to Keep Disclosure of Tor Hack

Dark web networks such as Tor have been in the spotlight of law enforcement agencies in recent years.This is largely due to the increased...

German Bill Proposes Tough Penalties for Darknet Operators & Tor Network

Germany’s legislative arm recently passed a bill aiming to subject anyone operating platforms on the dark web to harsher penalties.The German state of North...

Texas Lawyer Sues Tor for Providing Tools Used by Revenge Porn Site

UPDATE: It turns out the Tor Project is now not getting sued, see the story . Encryption service Tor has been caught up in a...

Executive Director Wants To Make Tor Browser More User-Friendly

Freedom fighter that she is, one who cares about technology and people’s personal privacy and security, Shari Steele rightfully sits as executive director of the non-profit Tor Project.Tor’s new boss took on this job after 15 years of leading the EFF or Electronic Frontier Foundation as executive director, which she has built into an international powerhouse for online rights protection.
3D illustration of computer keyboard with the script New Features on two adjacent green buttons

Tor 0.3.2.9 Released with New Features and Improved Stability

Developers have officially unveiled the 0.3.2.9 version of Tor, making it more stable and adding some new features. Those who wish to use the...
cryptocurrency cloud

Tor and the Cryptocurrency Ecosystem

Cryptocurrency has grown to be a globally recognized system that facilitates free and borderless trade, has no central authority, and provides enhanced consumer privacy. Thanks to the Tor software and network, the cryptocurrency community has grown tremendously in recent years.

ProtonMail Launches a Tor Hidden Service

Privacy-oriented email service ProtonMail has decided to take their security measures a step further by announcing the release of their new Tor hidden service.
OnionDSL

Engineer Designed a Tor-Based System called “OnionDSL”

Lawmakers in the UK are currently closing in on their newest and most comprehensive legal regime for mass-surveillance since the Snowden revelations. UK’s Investigatory Powers bill seems very near towards being signed as a law, yet a determined network engineer will not easily surrender privacy in the surveillance fight and makes good use of Tor.

Tor and Mozilla Working on To Make Malware Attacks More Difficult

Law enforcement agencies and malicious hackers may have a harder time getting access to the IP addresses of Tor users. Thanks to upcoming security upgrades that Tor Project and the creators of Mozilla Firefox have been discreetly working on.
Police car

US Tor Users Hacked By Australian Cops

According to reports, Australia’s law enforcement authorities hacked the computers of US Tor users when the Argos taskforce carried out an investigation into a child pornographic website. In one instance, Australian authorities hacked the computer of a Tor user in Michigan for the purpose of obtaining the IP address of the suspect.

TOR Project Plans To Count Hidden Services

If you are reading this, then you probably know all about the TOR project and what it does.Anyone with enough technical knowledge can build...

Tor Relay Operator Convicted for Child Sexual Exploitation

William W. was charged in November 2013 after police raided his home, confiscating 20 computers and assorted game consoles and Internet devices such as...

Tor Project Releases Browser for Android

The Tor Project has finally released the alpha version of the Tor browser for Android, giving smartphone users the opportunity to access the dark...

Tor Project Continues to Receive Donations

Financial numbers are in from the Tor Project’s donations campaign, “Strength in Numbers.”The non-profit organization was able to amass a total of over $460,000 during the...
Android is an operating system based on the Linux kernel and designed for touchscreen mobile devices.

Tor Browser Apps for Android and iOS

The anonymity browser Tor is mainly used for accessing the dark web, assuring no trace of the sites users have visited.There are many unscrupulous...

Tor Users May Not Need To Solve Annoying CAPTCHA Puzzles Soon

People who want to browse the web with anonymity using the Tor network are having problems with too many CAPTCHAs that they encounter before gaining access to a site. CAPTCHAs are the simple security tests or puzzles that are set to prove that the user is indeed a human being and not a robot or software. CloudFlare is the content delivery company behind these restrictive CAPTCHAs.

Another OpenSSL Vulnerability Affecting Tor Users

Today an announcement on www.openssl.org enlightened us on yet more vulnerabilities with the widely used software.One in particular that is not quite as lethal...
tor messenger logo

Tor’s New Messenger App Has Launched

Last Thursday, the Tor Project announced the release of Tor Messenger (beta version), open-source instant messenger client for those that are concerned about surveillance and privacy.

Wikipedia Editors Now Use Tor After Receiving Threats

Following the onslaught of pervasive threats on the lives and well-being of a number of Wikipedia editors, they have now resorted to hiding their identities under the cloak of anonymity offered by Tor.

FBI Hacked Tor and Took Down A Child Sexual Exploitation Site

Reports show that FBI’s hacking tool succeeded in cracking Tor and identifying the visitors to a dark web child pornography site. In fact, the FBI has made use of hacking methods that have never been seen deployed till date in order to bring down the clients and owners of one of the largest child pornography sites that have ever been created on the dark web.
Blue glowing darknet neon sign on a dark wall and a spotlight with a hacker silhouette approaching information security concept 3D illustration

Tor Indexing Tool

A new open-source web crawler has recently been unveiled to serve the Tor community. The crawler, called Fresh Onions, is designed for indexing hidden...

Tor-Based Messenger Briar Is Officially Released to the Public

Last July, a Tor-based messaging service called Briar was first announced. It was only in beta at the time, but the app showed a...
tor-riffle

New Anonymity Network “Riffle” Claimed To Be More Secure Than Tor

Riffle is being seen as a solution for the problems that Tor has been having of late. Researchers at the Artificial Intelligence Laboratory at MIT and the Polytechnic School of Lausanne in Switzerland have developed a new anonymity tool similar to Tor called Riffle.

Dr Gareth Owen: TOR – Attacks and Countermeasures

https://www.youtube.com/watch?v=rwawq8PsozU
Internet security online business concept pointing security services

Tor Unveils All-Improved Stable 7.5 Series & First Alpha Edition of the 8.0 Series

Tor has grown to become the staple of most internet-savvy people. For individuals that have never gotten a taste of the Tor experience, it...

What is Tor and Should You Use It?

There are many ways the internet can track us. Using Tor, online users can surf the web anonymously.
tor_browser_logo

Tor Browser 6.0.5 Has Been Released

Tor Browser 6.0.5 is now available for download. The latest release of the Tor dark web browser comes with a number of improvements, one of which is a crucial security update.
Headquarters of The New York Times

The New York Times Now Accessible Via Tor Onion Service

The New York Times has just announced that the internationally renowned publication is now accessible on the dark web. The media outlet is set...

Is the Tor Network Broken?

In the recent months it was also discussed about the possibility to track selected users on Tor networks with a technique known as Traffic...

Dark Web GitHub Accessible Via Tor And I2P

It’s very common for files that are hosted on sites for open source coding to draw the ire of authorities. Now though, there is a service on dark web which will allow novice developers to craft their controversial projects without being noticed. With this service, upstart developers can now concentrate on their work knowing that no government or service can thwart access to their code.

Researchers Discover How To Break Tor Anonymity

The Tor network has become the most widely used system for online anonymity.It has been used by journalists, lawyers and other professionals and people...

Send this to a friend