man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...

Some Top Sites Are Blocking Tor Users

It looks like Tor users are having difficulty surfing and navigating the World Wide Web, as some websites have set up discriminating rules against...

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download

Hacker Allegedly Selling 272 Million Credentials For Less Than $1

Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.
sigaint

Darknet Email Service “SIGAINT” Adds Tor Relay for Monero

SIGAINTsigaint In August 2016, AlphaBay and Oasis announced that they would integrate Monero. Since then, the demand of Monero has drastically increased. Recently, a darknet email service provider “SIGAINT” added a Tor relay for Monero transactions.

Lead Tor Developer Claims FBI Is Harassing Her

Isis Agora Lovecruft, a lead developer who has been working with the Tor team for many years, has accused the FBI of harassment. The FBI has wanted to talk to her but would not tell why. She has worked with the Tor team on many encryption and security products.
tor-riffle

New Anonymity Network “Riffle” Claimed To Be More Secure Than Tor

Riffle is being seen as a solution for the problems that Tor has been having of late. Researchers at the Artificial Intelligence Laboratory at MIT and the Polytechnic School of Lausanne in Switzerland have developed a new anonymity tool similar to Tor called Riffle.

How Hackers Get Rich Spreading Malware

Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.

Tor – A Beginner’s Guide

Intro: If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...

Exodus Flaw Leaked and Used to Unmask a Tor-Based Child Porn Site

Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.
Cropped photo of FBI agent using laptop

FBI Obtained Over 8,000 IP Addresses In Hacking Operation

In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.

Tor Strengthening Security With “Selfrando” Technique

According to reports, the Tor project researchers are beefing up the security of their browser so that it is kept safe from hacking attempts made by government investigating agencies such as the FBI. The security researchers are specifically testing a new technique called “Selfrando” to protect the browser from the exploits of the hackers.
Surf The Web Anonymously Using Tor Browser

94% of Tor Traffic is Malicious, According To CloudFlare

A recent report from CloudFlare says that over 94 percent of all the requests that come from across the Tor browsing network are of a malicious nature.That is, they use Tor to scam or phish or cause digital chaos.However, this does not seem to represent the whole story

Opera Added Free VPN To Their Browser

Last month, Opera announced that developers of this major browser maker have integrated a free and unlimited VPN (Virtual Private Network) to the existing desktop version of the browser.This will allow users to browse anonymously and retain their online privacy.It would also allow users to access websites that are blocked.

Home Of Privacy Activists Operating Tor Exit Nodes Searched

March 30, Wednesday. 6:15am. Jan Bultmann and David Robinson, cofounders of the Seattle Privacy Coalition (SPC), were woken up at their condominium by a team of six detectives from the Seattle Police Department.
google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...

“Autonomy Cube” Serves As A Tor Relay

It has been some years since Trevor Paglen became part of a fine artists’ movement that has been helping gallery-goers to deal with government spying and online privacy.
tor_browser_logo

Tor Browser 6.0.5 Has Been Released

Tor Browser 6.0.5 is now available for download. The latest release of the Tor dark web browser comes with a number of improvements, one of which is a crucial security update.

Sci-Hub Has A New Feature

Sci-Hub has introduced a new feature, a Telegram Messenger app, which helps users to search for peer-reviewed academic papers. Users’ communication with the app is encrypted.

DoD Now Accepts Applications For “Hack the Pentagon” Program

The US Department of Defense has started accepting applications for its “Hack the Pentagon” commercial bug bounty program. According to an announcement released by the Defense Department, the goal of the Hack the Pentagon program is to identify as well as resolve vulnerabilities in security within the department’s websites through crowdsourcing.

Protesters Asks Users Not To Use Tor on September 1

A group has called for a full-day shutdown of the Tor network as a mark of protest against two issues: handling of sexual misconduct accusations against Jacob Appelbaum and rumor that project might employ former government agents.

Tor Users May Not Need To Solve Annoying CAPTCHA Puzzles Soon

People who want to browse the web with anonymity using the Tor network are having problems with too many CAPTCHAs that they encounter before gaining access to a site. CAPTCHAs are the simple security tests or puzzles that are set to prove that the user is indeed a human being and not a robot or software. CloudFlare is the content delivery company behind these restrictive CAPTCHAs.

Executive Director Wants To Make Tor Browser More User-Friendly

Freedom fighter that she is, one who cares about technology and people’s personal privacy and security, Shari Steele rightfully sits as executive director of the non-profit Tor Project.Tor’s new boss took on this job after 15 years of leading the EFF or Electronic Frontier Foundation as executive director, which she has built into an international powerhouse for online rights protection.

Tor Project Developer Stepped Down From His Position

Thirty-three-year-old Jacob Appelbaum, a prominent developer with Tor Project developer and privacy activist, has resigned from his position on the board on May 25, according to reports.Tor announced his departure through a blog post without giving any reasons.

The Shadow Brokers Dumps More Alleged Exploits

The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.
torandroid

Tor Project Creates a New Version of a Tor-Enabled Mobile Device

The Tor Project has been making great strides in enhancing user privacy and security online. Their latest release promises to enhance mobile security, specifically that of devices running on Android-based platforms.

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

What is TorFlow?

The number of users on Tor has been growing substantially bigger over the last couple of years. It is not very difficult to understand why. Tor stands for anonymous web browsing - a method that largely enhances each user’s cyber security and privacy. This networking protocol will make any data relayed across several servers unidentifiable.

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

Feds Tell Senators How They Hack iPhone

The iPhone 5C has been the heart of the contentious ongoing public spat between Apple and the FBI. This Apple product was used by gunman Syed Rizwan Farook in the terrorist attack that killed 14 people in San Bernardino, California last December. FBI has cracked its way into the iPhone 5C, but the Apple-FBI saga continues as the agency spills the beans of the hack to members of Congress.

ProtonMail Launches a Tor Hidden Service

Privacy-oriented email service ProtonMail has decided to take their security measures a step further by announcing the release of their new Tor hidden service.

Bitcoin Creator Finally Revealed His Identity

Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.

Deanonymizing Tor Users With DNS Exploit

One of the famous anonymity network Tor is used widely to work anonymously. Tor or The Onion Router is a modern web browser which is operated by the non-profit, Tor Project. Almost 2 million users utilize this service regularly because it enables them to use the internet without revealing their identities.
Internet-of-Things

Tor Project Wants To Create New Security System For IoT

According to reports, the Guardian Project, Tor Project, and Home Assistant have come together to create a new security system that can protect IoT (Internet of Things) devices.

Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux?

If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web.Like any other...

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...
Book with title federal law on a table

Tor Joins Fight Against the Proposed Amendments to Rule 41

Tor finally broke their silence on September 12th concerning the proposed amendments to Rule 41 of the Federal Rules of Criminal Procedure, as Tor fervently opposed the idea in its entirety.
tor browser

Tor Pledges Not To Implement Any Backdoors into Their Project

The Tor Project published a blog on August 9, 2016, revealing their new social contract which includes the “no backdoors” pledge. In the blog, The Project has also said that the tools they make help to promote and protect human rights and that they make it possible through a set of guiding principles, which for a long time had remained unspoken.
OnionDSL

Engineer Designed a Tor-Based System called “OnionDSL”

Lawmakers in the UK are currently closing in on their newest and most comprehensive legal regime for mass-surveillance since the Snowden revelations. UK’s Investigatory Powers bill seems very near towards being signed as a law, yet a determined network engineer will not easily surrender privacy in the surveillance fight and makes good use of Tor.

What are Some of the Different Ways of Using Tor?

The Tor network, the brainchild of the Tor Project, has grown to become the most popular and effective anonymity tool since its conception.

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.
Man With anonymous association mask working on the laptop

Some Ways to Share Files Anonymously

File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.
tor browser logo

Tor Claimed “Snoopers’ Charter” Is A Threat To Citizens

On 4th November 2015, UK Home Secretary Theresa May released new rules that would give government intelligence agencies power to snoop on private data of UK citizens. The bill which was laid out in a 299-page document outlined the amendments the government wants to make regarding the interception as well as hacking of devices and computers so as to seamlessly access information when probing a case.
tor nodes

TorWorld – A New Site for Tor Enthusiasts

Ever since its launch back in September 2002, the Tor project (The Onion Routing Project) has seen unprecedented growth to be in the frontline in providing anonymity and privacy to millions of internet users.

New App Threatens Online Users’ Privacy

A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage.

Snowden’s Favorite Email Provider, Lavabit, Relaunches

Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.

Tor Announces the Release of Tor 0.2.9.5 Alpha

Tor’s latest browser, Tor 0.2.9.5-alpha, comes with a lot of promise in terms of major and minor bug fixes alongside some few minor features aimed at optimizing user experience and upgrades on its hidden services, download scheduling and a few other tweaks here and there to make the browser more efficient in all respects.

Send this to a friend