Increased censorship and online surveillance in some regions are increasingly becoming a concern for Internet users everywhere.This necessitates the development of anonymity tools to...
The Tor Project enforces strict guidelines and rules on the usage of its anonymous network.That’s why it banned the Tor relay node of a...
ProtonMail is a popular anonymous email service operating from Switzerland and is known for encrypting emails by default.Emails exchanged between the users of this service...
Instant messaging services and apps have significantly grown in number over the past few years, so users of all personalities and online behaviors are...
Within the world of technology, those who create new programs and software solutions put their products through rigorous tests before releasing them to the...
There are times when you may just have a gut feeling you’re being tracked, in the sense that someone is listening to your phone...
A 25-year-old British man was arrested for hacking into the United States Department of Defense system.Sean Caffrey, a resident of Sutton Coldfield in the...
The latest iteration of the Tor Browser series is now released, joined by a wealth of new features exciting for users.Earlier this month, Tor...
Prosecutors claim that a National Security Agency contractor has leaked a classified file showing details of Russia hacking voting vendors and breaching the local system.The...
The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...
A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage.
The families that helped hide Edward Snowden following the infamous NSA surveillance data leak in 2013 have been denied asylum by the Hong Kong government.
A Russian math instructor who administrates a Tor exit node was arrested and charged with inciting mass riots and terrorism via the internet.
Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.
The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.
The Office of Personal Management seems to be paying too much money for an identity theft protection program for the victims of its 2015 data breach.
An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.
Just what is privacy anyway? What is anonymity? Are they the same, or is one more desirable than the other? Are privacy and security...
In the internet era, user privacy has become a hot-button issue in many jurisdictions.This has led to the development of more than 800 encryption...
A trio of families in Hong Kong who hosted rogue NSA contractor Edward Snowden in 2013 are seeking asylum in Canada.
If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web.Like any other...
Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...
OpenBazaar is an online marketplace that is introducing a new approach to its e-commerce platform. Unlike the typical centralized service marketplaces like eBay, OpenBazaar...
Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.
The Tor Project has yet again reaffirmed their commitment towards safeguarding online privacy, this time with the launch of a new mobile app called OONIProbe.
The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.
The Tor network, the brainchild of the Tor Project, has grown to become the most popular and effective anonymity tool since its conception.
Up until recently, DRM-protected multimedia files have been used in Windows primarily to spread malware.
Ever since its launch back in September 2002, the Tor project (The Onion Routing Project) has seen unprecedented growth to be in the frontline in providing anonymity and privacy to millions of internet users.
Recent developments in the cyber-crime domain have indicated that not even well-established industry players are immune from cyber-attacks.
Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.
Privacy-oriented email service ProtonMail has decided to take their security measures a step further by announcing the release of their new Tor hidden service.
It seems that cyber criminals are constantly modifying and improving the tactics they use to achieve t
Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.
File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.
The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.
Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”
Cryptocurrency has grown to be a globally recognized system that facilitates free and borderless trade, has no central authority, and provides enhanced consumer privacy. Thanks to the Tor software and network, the cryptocurrency community has grown tremendously in recent years.
Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.
DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.
Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.
Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.
The Tor Project has been making great strides in enhancing user privacy and security online. Their latest release promises to enhance mobile security, specifically that of devices running on Android-based platforms.
Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.
Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.
Sven Olaf Kamphuis, the Dutch hacker responsible for the biggest cyber-attack of all time, is apparently a free man once again after most of his sentence was suspended by the court.
Tor’s latest browser, Tor 0.2.9.5-alpha, comes with a lot of promise in terms of major and minor bug fixes alongside some few minor features aimed at optimizing user experience and upgrades on its hidden services, download scheduling and a few other tweaks here and there to make the browser more efficient in all respects.
The hard-fought censorship battle going on between the Turkish government and its citizens is still raging as Turkish citizens are finding more and more ways to avoid the government’s measures to stop them from accessing social media sites.
The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download