Using Tor’s Hidden Services To Maximize the Security of Push Notification Services

Push notification, which is also referred to as server push notification, represent the process of delivery of data from a software app to a given computing device, without having to deal...

Deadmann : A New Dead Man Switch’s Network That Utilizes The Tor Network

Deadmann is a newly proposed anonymous network protocol which is comprised of multiple dead man’s switches that can share data even when a user across the network becomes incapacitated. Previously proposed...

Russian Tor Relay Operator Facing Terrorism Charges

The Russian police have arrested Tor node operator Dmitry Bogatov. They charged him with terrorism offense and the reason for this, as they claim, is the connection between his IP address...

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across...

Attention – Anomalous RSA Keys In Tor Relays Can Undermine Your Privacy

The Tor network is by far the biggest volunteer run anonymous network on the planet. Since its launch, the network has witnessed thousands of relay nodes come and go, throughout the...

Harpooning the StingRay: How to Detect and Avoid IMSI Catchers that Spy on Cellular...

Across the world law enforcement agencies, intelligence agencies, and militaries are deploying technology known as IMSI catchers. This technology enables government to conduct mass surveillance of cellular phone and internet activity,...

Cooking With Onions: Names for your onions

  Onion addresses are weird... 洋葱地址很奇怪 This post is about onion addresses being weird and the approaches that can be taken to improve onion service usability. 这篇文章是关于洋葱地址是奇怪的,可以采取的方法来提高洋葱服务的可用性。 In particular, if you've cruised around the onionspace, you...

Is The Tor Browser Fully Anonymous? (The Myth and Reality)

Many think that Tor is a fully anonymous and secure means for browsing the internet, that doesn’t give a chance to anyone to monitor one’s browsing behavior and trace it back...

A Comprehensive Privacy Analysis of Tor Hidden Services

Tor is one of the most popular darknets, which is known for its high levels of anonymity. Even though Tor’s protocol and its relay security have been thoroughly studied, there is...

DoJ Drops Child Porn Charges to Keep Tor Exploit Confidential

Last April, the FBI refused to comply with a federal judge when he requested information about the Bureau’s Tor exploit. The FBI used a piece of malware called a Network Investigative...
- Advertisement -

APLICATIONS

Faraday v2.4 – Collaborative Penetration Test and Vulnerability Management Platform

Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track...

HOT NEWS