Seven Friends of VPN: Top Applications to Keep Anonymity on the Web

The most popular anonymous browser worldwide has finally released an Android version of Tor. I have collected several apps that will ensure your privacy and safety online. They can protect the anonymity ...
Image Courtesy of  Yo wp

Exit, Stage Left…

Image Courtesy of Yowp via Pierluigi Paganini, comes news of TOR leveraged scans searching for BlueKeep vulns, as those observed scans are conveyed and exiting via TOR exit nodes ...
Are Darknet Take-Downs Effective?

Are Darknet Take-Downs Effective?

Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs are generally digital perp walks meant to remind the public ...
Alleged Child Porn Lord Faces US Extradition

Alleged Child Porn Lord Faces US Extradition

In 2013, the FBI exploited a zero-day vulnerability in Firefox to seize control over a Dark Web network of child pornography sites. The alleged owner of that ring - 33-year-old Freedom Hosting ...
Behind the Scenes of Onion Services

Behind the Scenes of Onion Services

| | tor
In this article, we discuss how the domain name of the services in the Tor network are set and what security risks they may pose. We examine a study from Princeton University ...
Hacker Sells 620 Million Customer Details on Dark Web for $20k in Bitcoin

Hacker Sells 620 Million Customer Details on Dark Web for $20k in Bitcoin

A single seller is offering approximately 620 million stolen customer details on the dark, according to The Register, which says it has been in touch with the seller and the database is ...
PcapTor

TorPCAP – Tor Network Forensics

Unencrypted network traffic, destined for the Tor network, is sent between localhost TCP sockets on computers running Tor clients, such as the Tor Browser. In this blog post I show how anonymous ...

Exposing the Public IPs of Tor Services Through SSL Certificates

The Onion Router, also known as Tor, is an internet service that provides anonymous internet surfing to users by bouncing the connection on several relays. By doing this Tor users avoid exposing ...

Top 5 Best Alternatives for the Tor Browser

| | Browsers, Privacy, tor, Tor Browser
The Tor browser has become quite popular among internet users. It allows users to browse anonymously at a time when lots of privacy issues seem to be bugging people on the internet ...
Facebook

The Shared Security Podcast Episode 78 – Summer Camp Facial Recognition, Dark Web Dangers

This is the 78th episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was hosted ...
Loading...