Why Australian Dark Web Users Should Be Worried

Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.

The Shadow Brokers Dumps More Alleged Exploits

The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.

OPM Overpays for Identity Theft Protections After 2015 Data Breach

The Office of Personal Management seems to be paying too much money for an identity theft protection program for the victims of its 2015 data breach.

Teen Arrested for Making Anonymous Bomb Threats

An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.

A Practical Guide to the Theory and Practice of Online Privacy

Just what is privacy anyway? What is anonymity? Are they the same, or is one more desirable than the other? Are privacy and security...

Tor to Enhance Users’ Privacy and Security

In the internet era, user privacy has become a hot-button issue in many jurisdictions. This has led to the development of more than 800 encryption...

Families Who Sheltered Edward Snowden Seeking Canada Asylum

A trio of families in Hong Kong who hosted rogue NSA contractor Edward Snowden in 2013 are seeking asylum in Canada.

Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux?

If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web. Like any other...

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11. To date, there are no signs of the site going online...

OpenBazaar To Enhance Users’ Anonymity with Tor Integration

OpenBazaar is an online marketplace that is introducing a new approach to its e-commerce platform. Unlike the typical centralized service marketplaces like eBay, OpenBazaar...

Edward Snowden Wants to Protect Journalists and Sources

Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.

Tor Project Launches New Mobile App Called “OONIProbe”

The Tor Project has yet again reaffirmed their commitment towards safeguarding online privacy, this time with the launch of a new mobile app called OONIProbe.

Russia Has Received No Request for Edward Snowden Extradition to US

The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.

What are Some of the Different Ways of Using Tor?

The Tor network, the brainchild of the Tor Project, has grown to become the most popular and effective anonymity tool since its conception.

DRM-Protected Files Used to Deanonymize Tor Browser Users

Up until recently, DRM-protected multimedia files have been used in Windows primarily to spread malware.

TorWorld – A New Site for Tor Enthusiasts

Ever since its launch back in September 2002, the Tor project (The Onion Routing Project) has seen unprecedented growth to be in the frontline in providing anonymity and privacy to millions of internet users.

New Phishing Campaign Targets Gmail Users

Recent developments in the cyber-crime domain have indicated that not even well-established industry players are immune from cyber-attacks.

Snowden’s Favorite Email Provider, Lavabit, Relaunches

Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.

ProtonMail Launches a Tor Hidden Service

Privacy-oriented email service ProtonMail has decided to take their security measures a step further by announcing the release of their new Tor hidden service.

New Ransomware Called “GoldenEye” Targets HR Departments

It seems that cyber criminals are constantly modifying and improving the tactics they use to achieve t

Hacktivist Group “Anonymous” Hacks The Thai Government Job Portal

Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.

Some Ways to Share Files Anonymously

File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.

Over 1 Million People Support the Pardon Snowden Campaign

The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.

Koolova Ransomware Decrypts Files If You Read 2 Cybersecurity Articles

Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”

Tor and the Cryptocurrency Ecosystem

Cryptocurrency has grown to be a globally recognized system that facilitates free and borderless trade, has no central authority, and provides enhanced consumer privacy. Thanks to the Tor software and network, the cryptocurrency community has grown tremendously in recent years.

Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.

Exodus Flaw Leaked and Used to Unmask a Tor-Based Child Porn Site

Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.

Snowden Says Petraeus Shared More Sensitive Info Than He Ever Did

Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
The FBI’s mass hacking operation was revealed to have compromised over 8,000 computers in 120 countries around the world.

FBI Obtained Over 8,000 IP Addresses In Hacking Operation

In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.

Tor Project Creates a New Version of a Tor-Enabled Mobile Device

The Tor Project has been making great strides in enhancing user privacy and security online. Their latest release promises to enhance mobile security, specifically that of devices running on Android-based platforms.

What Onion Service Operators Can Do To Mitigate DDoS Attacks

Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

Spamhaus Hacker Will No Longer Spend Time In Jail

Sven Olaf Kamphuis, the Dutch hacker responsible for the biggest cyber-attack of all time, is apparently a free man once again after most of his sentence was suspended by the court.

Tor Announces the Release of Tor 0.2.9.5 Alpha

Tor’s latest browser, Tor 0.2.9.5-alpha, comes with a lot of promise in terms of major and minor bug fixes alongside some few minor features aimed at optimizing user experience and upgrades on its hidden services, download scheduling and a few other tweaks here and there to make the browser more efficient in all respects.

Turks Flock to Tor after Government Blocked Popular Social Media Sites

The hard-fought censorship battle going on between the Turkish government and its citizens is still raging as Turkish citizens are finding more and more ways to avoid the government’s measures to stop them from accessing social media sites.

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download

Deanonymizing Tor Users With DNS Exploit

One of the famous anonymity network Tor is used widely to work anonymously. Tor or The Onion Router is a modern web browser which is operated by the non-profit, Tor Project. Almost 2 million users utilize this service regularly because it enables them to use the internet without revealing their identities.

Wikipedia Editors Now Use Tor After Receiving Threats

Following the onslaught of pervasive threats on the lives and well-being of a number of Wikipedia editors, they have now resorted to hiding their identities under the cloak of anonymity offered by Tor.

How HTML5 May Bring In New Internet Security Threats

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet. HTML is the dominant web...

Tor and Mozilla Working on To Make Malware Attacks More Difficult

Law enforcement agencies and malicious hackers may have a harder time getting access to the IP addresses of Tor users. Thanks to upcoming security upgrades that Tor Project and the creators of Mozilla Firefox have been discreetly working on.

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.

Tor Joins Fight Against the Proposed Amendments to Rule 41

Tor finally broke their silence on September 12th concerning the proposed amendments to Rule 41 of the Federal Rules of Criminal Procedure, as Tor fervently opposed the idea in its entirety.

Tor Users May Not Need To Solve Annoying CAPTCHA Puzzles Soon

People who want to browse the web with anonymity using the Tor network are having problems with too many CAPTCHAs that they encounter before gaining access to a site. CAPTCHAs are the simple security tests or puzzles that are set to prove that the user is indeed a human being and not a robot or software. CloudFlare is the content delivery company behind these restrictive CAPTCHAs.

Edward Snowden Warns About Google’s Messaging App “Allo”

Google officially launched its widely anticipated messaging app, Allo, last September. The App is poised to become a major competitor of the popular WhatsApp and iMessage. However, former NSA contractor and whistleblower, Edward Snowden has informed smartphone users to avoid the app due to a number of privacy concerns.

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.
sigaint

Darknet Email Service “SIGAINT” Adds Tor Relay for Monero

SIGAINTsigaint In August 2016, AlphaBay and Oasis announced that they would integrate Monero. Since then, the demand of Monero has drastically increased. Recently, a darknet email service provider “SIGAINT” added a Tor relay for Monero transactions.

Two VPN Servers Seized By Authorities

A VPN provider by the name Perfect Privacy was targeted by the Dutch police on the 24th of August after two of their servers were seized for investigation. No notice whatsoever had been issued beforehand, and the VPN provider only came to know of the incident after they were informed by a Rotterdam hosting company by the name I3D.
tor_browser_logo

Tor Browser 6.0.5 Has Been Released

Tor Browser 6.0.5 is now available for download. The latest release of the Tor dark web browser comes with a number of improvements, one of which is a crucial security update.
google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...

Subscribe Now To Our Newsletter

Sign up to the Anonymity Newsletter by DWN and get member info on the best security tips and news on the Darkweb

You have Successfully Subscribed!