anonymity
BREAKING NEWS: You’re not Anonymous on Facebook (Duh)
Richi Jennings | | anonymity, defamation, dutch, facebook, Facebook privacy, Meta, Netherlands, Privacy, SB Blogwatch, social media, The Netherlands
How Free is Your Speech? Court orders Meta to unmask anon OP ...
Security Boulevard
Apple Will Offer Onion Routing for iCloud/Safari Users
At this year’s Apple Worldwide Developer Conference, Apple announced something called “iCloud Private Relay.” That’s basically its private version of onion routing, which is what Tor does. Privacy Relay is built into ...
Authentic8 and LifeRaft: Simplifying workflow to get to ground truth faster
Integration between our Silo Web Isolation Platform and LifeRaft’s security intelligence solution, Navigator, provides the efficiency, security and anonymity to tackle threats ...
Identifying the Person Behind Bitcoin Fog
Bruce Schneier | | anonymity, Bitcoin, crime, cryptocurrency, dark web, de-anonymization, FBI, identification, tracking, Uncategorized
The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so that it was hard ...
Oblivious DNS-over-HTTPS
This new protocol, called Oblivious DNS-over-HTTPS (ODoH), hides the websites you visit from your ISP. Here’s how it works: ODoH wraps a layer of encryption around the DNS query and passes it ...
Use the Dark Web to Enhance your Investigations – Learn How [Training Course]
A8 Team | | anonymity, dark web, Online Research, OSINT, Privacy, Silo for Research, Silo for Safe Access, Web Isolation
The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations ...
How to Use Pastebin for Cyber Threat Intelligence Research
A8 Team | | anonymity, Online Research, security, Silo for Research, Threat Intelligence, Web Isolation
A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data ...
Handbook: Tools, Tips & Tricks for Threat Hunters
A8 Team | | anonymity, Cloud Browser, collaboration, Online Research, security, Silo for Research, Threat Intelligence, Web Isolation
Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ...
Do Financial Crime Investigators Have a Bull’s Eye on their Back?
Rishi Kant | | anonymity, Cloud Browser, Online Research, Silo for Research, Threat Intelligence, Web Isolation
Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission? ...
“Almost Like a Virtual Safe Room”
A8 Team | | anonymity, Cloud Browser, GDPR, Online Research, Privacy, remote work, security, Silo for Research, Silo for Safe Access, Threat Intelligence, Web Isolation
On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ...