tor

  1. Man

    A wave of complaints has jeopardized the operation of Tor

    Experts repelled an attempt to violate the anonymity of users. In late October, Tor administrators, relay operators, and even the Tor Project team began receiving complaints about port scans allegedly being conducted by their servers. As it turned out later, the attackers used fake IP addresses...
  2. Friend

    Law or pressure? How Police Raids Are Endangering the Future of Tor in Germany.

    Artikel 5 e.V. is on the verge of closure after police action. German law enforcement agencies searched the house and office registered to the address of the organization Artikel 5 e.V., which supports the Tor network. This is the second such case after a similar raid in 2017. Despite the fact...
  3. Professor

    How People Are Identified on the Darknet. Tor Won't Help You.

    Do you think that it is impossible to find a person on the darknet because you cannot “punch them by IP”? Not at all! We will tell you how people are identified on the dark web. Straight to the point: it is impossible to hide completely on the darknet. The darknet is teeming with offers of...
  4. Friend

    Защитите свои криптовалютные активы: руководство по использованию Electrum с Tor

    Введение в Electrum и его функции безопасности В сфере криптовалют приоритет кибербезопасности имеет первостепенное значение. Один из эффективных способов укрепить безопасность вашего хранилища Bitcoin — использовать Electrum в сочетании с сетью Tor, тем самым обеспечивая максимальную...
  5. Tomcat

    How do they catch secret site administrators in Tor/DarkWeb?

    In this article I will talk about how resource administrators are identified on the Tor Network, that is, on the dark web. We'll look at the structure of Tor sites, discuss known cases of deanon, and many other features of this dark corner of the Internet, which is considered anonymous. Along...
  6. Father

    Tor Browser: Network anonymity, the darknet, and intelligence agencies

    How does the most confidential browser work, does it really guarantee users anonymity, and should it be banned for the sake of fighting cybercrime? Contrary to popular belief, criminal activity accounts for an insignificant proportion of the Tor network. In 2020, researchers from the United...
  7. Father

    TOR, proxy and VPN: Okta warns about large-scale identity theft

    The company gave recommendations to users on how to protect their accounts. Okta warns about a sharp increase in the number and scale of attacks by selecting credentials aimed at online services. According to Okta, the attacks were made possible by the widespread use of resident proxy services...
  8. Teacher

    Is TOR secure?

    "Is it safe enough to rely on?" Shalom! — this is one of the most frequently asked questions about the Torah, and here people are divided into two camps: First: Tor supporters who defend this technology as freeing people from the gaze of Big Brother. Second: Tor opponents who claim that it is...
  9. Brother

    Audit results of Tor Browser and Tor infrastructure components

    Developers of the anonymous Tor network have published the results of an audit of the Tor Browser and the OONI Probe, rdsys, BridgeDB, and Conjure tools developed by the project, which are used for anonymous network connections that are protected from eavesdropping and traffic analysis...
  10. Brother

    17 vulnerabilities in Tor: results of the second security audit published

    Denial of service, outdated software-there is something to pay attention to. The Tor published a report on the results of the second inspection carried out by Radically Open Security from April to August 2023. As part of the review, the code for ensuring the operation of exit nodes, the Tor...
  11. Brother

    WhiteSnake: Malware that can control your computer via Tor

    Why should you be careful when installing PyPI packages? The Fortinet FortiGuard Labs team found malicious packages in the Python Package Index (PyPI) repository that deliver the WhiteSnake Stealer infostiler to Windows systems. Packages containing malware are called nigpal, figflix, telerer...
  12. Brother

    An implementation of Tor in the Rust language is presented, which in the future will replace the C version

    The developers of the anonymous Tor network have published the release of the Arti 1.1.12 project. Version Arti 1.1.12 is notable for bringing the implementation of onion services to the point of being ready for testing and experimentation. Using Arti, you can now not only connect to existing...
  13. Lord777

    Tor removes repeaters: the project fights against cryptocurrency scammers

    The action caused a storm of discussions and concerns among users. The Tor Project explained its decision to remove several network relays that posed a threat to the security and privacy of all users. Tor relays, being key elements in the Tor network's traffic anonymization system, are...
  14. Lord777

    Tor Project removed some nodes for questionable activity

    The Tor Project team explained their recent decision to remove many nodes by saying that they posed a threat to the security of all users of the Tor network. It turned out that the operators of some relays participated in a "high-risk cryptocurrency scheme that promises monetary benefits" and...
  15. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  16. Carding 4 Carders

    De-onion. How to catch site administrators in Tor.

    In this article, I will talk about how resource administrators are calculated in the Tor Network, that is, in the Dark Web. We will look at the structure of sites in Tor, discuss the known cases of deanon and many other features of this dark corner of the Internet, which is considered anonymous...
  17. Lord777

    Anonymous VPN+TOR+VPN Chain

    As you probably know, the VPN-TOR-VPN chain provides very good anonymity on the network. In today's article, you will learn how to install this chain on your computer. I wish you a pleasant reading! We will need a computer or laptop with Windows installed, VirtualBox, a whonix-Gateway image, a...
  18. Lord777

    The difference between VPN, Socks, SSH, Tor and PPT. Which is better?

    Today's topic will help clarify the minds of beginners, as well as anyone who is just starting to learn the basics of anonymity on the Web. We'll look at the differences between anonymity tools such as VPN, SOCKS, SSH, TOR, and PPT. 1) VPN: VPN - encrypts all traffic from prying eyes, hides our...
  19. Lord777

    Decentralized VPNs or Tor? What is the difference and what to choose?

    Let's look at current methods of using a secure, anonymous, and free Internet. There are a lot of restrictions on the modern Internet. But in addition to regional blockages that are relevant for our country, Internet users are often concerned about security and anonymity. What tools are better...
  20. Merkel

    Создаем свой сайт в TOR . Лезем в DarkNet.

    На первый взгляд может показаться сложным запустить свой сайт в сети Tor, но в действительности все обстоит иначе. Во-первых, вам необходимо установить и настроить NGINX.Все описанные ниже шаги по установке и настройке будут выполняться на сервере под управлением Debian 10. Затем...
Top