What is TorFlow?

The number of users on Tor has been growing substantially bigger over the last couple of years. It is not very difficult to understand why. Tor stands for anonymous web browsing - a method that largely enhances each user’s cyber security and privacy. This networking protocol will make any data relayed across several servers unidentifiable.
tor browser logo

Tor Claimed “Snoopers’ Charter” Is A Threat To Citizens

On 4th November 2015, UK Home Secretary Theresa May released new rules that would give government intelligence agencies power to snoop on private data of UK citizens. The bill which was laid out in a 299-page document outlined the amendments the government wants to make regarding the interception as well as hacking of devices and computers so as to seamlessly access information when probing a case.

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.
tor messenger logo

Tor’s New Messenger App Has Launched

Last Thursday, the Tor Project announced the release of Tor Messenger (beta version), open-source instant messenger client for those that are concerned about surveillance and privacy.

Lebanon Library To Support Tor, Causes Debate

A huge debate between law enforcement and civil libertarians ensued after Kilton Public Library from Lebanon, New Hampshire, announced its intention to dedicate their computers to become part of the Tor network.

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

Secure And Anonymous Email Service

Name: Lelantos Description: Lelantos is a secure and anonymous email service operating and offering its services to Tor users.Given its nature as an anonymous email provider,...

Choosing The Best Shredders

Name: Bonsaii DocShred C156-C 8-Sheet Micro-Cut Description: As far as physical shredders go, there are several factors that need to be looked into when deciding on...

Socks Proxy Services: Vip72, AnyProxy, PremSocks

Name: Vip72, AnyProxy, PremSocks Description: Vip72 is the largest provider of Socks proxy service claiming to offer proxies from 130 countries and over 25 thousand available...

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...

Tor – A Beginner’s Guide

Intro: If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...

Grams Helix – Bitcoin Tumbling Service

Name: Grams HelixDescription: Helix is a bitcoin tumbling service created and operated by the creator of Grams. What tumbling your “Bitcoin” does is let you mix...

CyberScrub: For Safe And Secure Data Deletion

Name: CyberScrub Description: CyberScrub is software used for safely and completely erasing data from your drive. It is a fact that erasing data or formatting a hard...

PGP (Pretty Good Privacy)

Name: PGP (Pretty Good Privacy)Description:PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone...

Behavioral Profiling – Risk To Anonymity And Privacy

Deriving information from a person from a website they visit is not something new, but making an inference from their speed of keying in...

Researchers Discover How To Break Tor Anonymity

The Tor network has become the most widely used system for online anonymity.It has been used by journalists, lawyers and other professionals and people...
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

OPM Data Appears To Be For Sale – Is it Legit?

Back in Mid-April, the Office of Personnel Management in the US discovered a major security breach that had caused on the leaking of data...

Major Security Breach Leaks Files Of Over 4.1 Million US Government Employees on the...

Almost as if to spite the NSA’s expansion of its Internet “defense” program, or spying to the rest of us, a major data breach...

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...

NSA Planned To Hack App Stores To Track Smartphones

As I write this, just a week remains until the patriot act expires, and the end hopefully comes to years of unconstitutional, unwarranted surveillance...

The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...

Send this to a friend