tor

  1. Father

    Tor Browser: Network anonymity, the darknet, and intelligence agencies

    How does the most confidential browser work, does it really guarantee users anonymity, and should it be banned for the sake of fighting cybercrime? Contrary to popular belief, criminal activity accounts for an insignificant proportion of the Tor network. In 2020, researchers from the United...
  2. Father

    TOR, proxy and VPN: Okta warns about large-scale identity theft

    The company gave recommendations to users on how to protect their accounts. Okta warns about a sharp increase in the number and scale of attacks by selecting credentials aimed at online services. According to Okta, the attacks were made possible by the widespread use of resident proxy services...
  3. Teacher

    Is TOR secure?

    "Is it safe enough to rely on?" Shalom! — this is one of the most frequently asked questions about the Torah, and here people are divided into two camps: First: Tor supporters who defend this technology as freeing people from the gaze of Big Brother. Second: Tor opponents who claim that it is...
  4. Brother

    Audit results of Tor Browser and Tor infrastructure components

    Developers of the anonymous Tor network have published the results of an audit of the Tor Browser and the OONI Probe, rdsys, BridgeDB, and Conjure tools developed by the project, which are used for anonymous network connections that are protected from eavesdropping and traffic analysis...
  5. Brother

    17 vulnerabilities in Tor: results of the second security audit published

    Denial of service, outdated software-there is something to pay attention to. The Tor published a report on the results of the second inspection carried out by Radically Open Security from April to August 2023. As part of the review, the code for ensuring the operation of exit nodes, the Tor...
  6. Brother

    WhiteSnake: Malware that can control your computer via Tor

    Why should you be careful when installing PyPI packages? The Fortinet FortiGuard Labs team found malicious packages in the Python Package Index (PyPI) repository that deliver the WhiteSnake Stealer infostiler to Windows systems. Packages containing malware are called nigpal, figflix, telerer...
  7. Brother

    An implementation of Tor in the Rust language is presented, which in the future will replace the C version

    The developers of the anonymous Tor network have published the release of the Arti 1.1.12 project. Version Arti 1.1.12 is notable for bringing the implementation of onion services to the point of being ready for testing and experimentation. Using Arti, you can now not only connect to existing...
  8. Lord777

    Tor removes repeaters: the project fights against cryptocurrency scammers

    The action caused a storm of discussions and concerns among users. The Tor Project explained its decision to remove several network relays that posed a threat to the security and privacy of all users. Tor relays, being key elements in the Tor network's traffic anonymization system, are...
  9. Lord777

    Tor Project removed some nodes for questionable activity

    The Tor Project team explained their recent decision to remove many nodes by saying that they posed a threat to the security of all users of the Tor network. It turned out that the operators of some relays participated in a "high-risk cryptocurrency scheme that promises monetary benefits" and...
  10. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  11. Carding 4 Carders

    De-onion. How to catch site administrators in Tor.

    In this article, I will talk about how resource administrators are calculated in the Tor Network, that is, in the Dark Web. We will look at the structure of sites in Tor, discuss the known cases of deanon and many other features of this dark corner of the Internet, which is considered anonymous...
  12. Lord777

    Anonymous VPN+TOR+VPN Chain

    As you probably know, the VPN-TOR-VPN chain provides very good anonymity on the network. In today's article, you will learn how to install this chain on your computer. I wish you a pleasant reading! We will need a computer or laptop with Windows installed, VirtualBox, a whonix-Gateway image, a...
  13. Lord777

    The difference between VPN, Socks, SSH, Tor and PPT. Which is better?

    Today's topic will help clarify the minds of beginners, as well as anyone who is just starting to learn the basics of anonymity on the Web. We'll look at the differences between anonymity tools such as VPN, SOCKS, SSH, TOR, and PPT. 1) VPN: VPN - encrypts all traffic from prying eyes, hides our...
  14. Lord777

    Decentralized VPNs or Tor? What is the difference and what to choose?

    Let's look at current methods of using a secure, anonymous, and free Internet. There are a lot of restrictions on the modern Internet. But in addition to regional blockages that are relevant for our country, Internet users are often concerned about security and anonymity. What tools are better...
  15. Merkel

    Создаем свой сайт в TOR . Лезем в DarkNet.

    На первый взгляд может показаться сложным запустить свой сайт в сети Tor, но в действительности все обстоит иначе. Во-первых, вам необходимо установить и настроить NGINX.Все описанные ниже шаги по установке и настройке будут выполняться на сервере под управлением Debian 10. Затем...
  16. Brother

    Which is better Tor over VPN or VPN over Tor

    On hacker and computer forums, I often come across discussions on the topic of what is better TOR over VPN or VPN over TOR. Looking ahead, I want to say that there is no unambiguous answer to this question. In certain situations, one bundle is better and the other is worse. In the article, we...
  17. Brother

    Darknet marketplaces move from Tor to I2P

    Libertas Market was the first underground marketplace to ditch Tor entirely in favor of I2P. The success of law enforcement agencies in deanonymizing Tor users has forced cybercriminals to look for alternative platforms to carry out their activities. At least one clandestine marketplace has...
  18. Mutt

    What not to do in Tor

    Do not use personal social accounts. networks. I do not recommend logging into your personal Vkontakte account, Facebook or any other social network. Even if you use a fake name, most likely this account is associated with friends who know you. Ultimately, a social network can guess who the...
  19. Father

    13 лучших ОС для TOR 2021

    В поисках лучшей ОС для Tor? Да, это круто, в этом нет ничего плохого, вы, вероятно, просто еще одна душа на планете, заботящаяся о безопасности и конфиденциальности, как и я. Или, может быть, вы наконец узнали достаточно о глубокой паутине, чтобы знать лучше; и не доверять общей операционной...
  20. Mutt

    100+ сайтов даркнета, которые вы не найдете в Google

    Страница приветствия в браузере Tor - обычно с нее пользователи начинают свое путешествие в Dark Web. Темная паутина - не место для всех, но некоторые ее части стоит изучить. Для тех, кто может быть немного слабонервным, но все же остался с нами в нашем туристическом путеводителе по Dark Web...
Top