#onion-network

[ follow ]
#iran
World news
fromnews.bitcoin.com
9 hours ago

Iran's Digital Blockade Continues: Citizens Endure 50 Days Without Internet Connectivity

Iran's 50-day digital blockade has reduced internet connectivity to 2%, causing $1.8 billion in economic losses.
World news
fromwww.dw.com
2 days ago

Iran: Internet blackout highlights real toll of censorship

Iran's government imposed a prolonged internet blackout to suppress protests and control information during conflicts, impacting businesses and personal communications.
World news
fromnews.bitcoin.com
9 hours ago

Iran's Digital Blockade Continues: Citizens Endure 50 Days Without Internet Connectivity

Iran's 50-day digital blockade has reduced internet connectivity to 2%, causing $1.8 billion in economic losses.
World news
fromwww.dw.com
2 days ago

Iran: Internet blackout highlights real toll of censorship

Iran's government imposed a prolonged internet blackout to suppress protests and control information during conflicts, impacting businesses and personal communications.
#privacy
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy technologies
fromBitcoin Magazine
2 weeks ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy technologies
fromBitcoin Magazine
2 weeks ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
#ddos
Information security
fromThe Hacker News
2 days ago

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

Operation PowerOFF disrupted DDoS-for-hire services, taking down 53 domains and arresting four individuals linked to over 75,000 cybercriminals.
EU data protection
fromSecurityWeek
2 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Information security
fromThe Hacker News
2 days ago

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

Operation PowerOFF disrupted DDoS-for-hire services, taking down 53 domains and arresting four individuals linked to over 75,000 cybercriminals.
EU data protection
fromSecurityWeek
2 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
#internet-shutdowns
fromSilicon Canals
1 month ago
World politics

I mapped who profits when a country's internet gets shut down - it's never who you think - Silicon Canals

fromSilicon Canals
1 month ago
World politics

I mapped who profits when a country's internet gets shut down - it's never who you think - Silicon Canals

Social media marketing
fromWIRED
4 days ago

X's Big Bot Purge Wiped Out a Lot of People's Secret Porn Feeds

X's crackdown on bots has led to the suspension of many human accounts, including those used for private content curation.
fromWIRED
4 days ago

Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market

Xinbi Guarantee has also hosted a wide variety of other black market offerings, including harassment services that threaten or throw feces at a victim for a fee, and even sex workers as young as 14 who are likely trafficking victims.
UK news
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Education
fromWIRED
4 days ago

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

AI-generated deepfake nude images are impacting nearly 90 schools and over 600 students globally, causing severe emotional distress among victims.
Software development
fromZDNET
5 days ago

This Linux distro offers an easy DNS switcher - but there's more to it that I like

iDealOS is a new MXLinux-based distribution offering two editions, emphasizing choice and the potential for paid Linux models.
#google
fromThe Verge
5 days ago
Privacy professionals

Privacy advocates want Google to stop handing consumer data over to ICE

fromPCWorld
3 days ago
Privacy technologies

Google will soon penalize sites that hijack your browser's back button

Privacy professionals
fromThe Verge
5 days ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
Privacy technologies
fromPCWorld
3 days ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
fromYcombinator
5 days ago
Information security

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
fromSecurityWeek
5 days ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets.
Information security
Privacy professionals
fromSecurityWeek
6 days ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
#cybersecurity
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromFast Company
5 days ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromFast Company
5 days ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Digital life
fromScary Mommy
3 weeks ago

People On Reddit Are Sharing Their Favorite "Underground" Websites - Here Are The Best Ones

Many underground websites can enhance productivity, provide free resources, and offer unique experiences online.
fromwww.dw.com
1 month ago

The internet was supposed to be free. What went wrong?

When Guatemalan computer scientist Luis von Ahn first proposed the idea of "games with a purpose" (GWAPs) in 2004, his goal was to harness human brainpower so that computers could learn from it. His idea was simple: Get humans to solve tasks that are trivial to us but difficult for computers back then, like labeling images, transcribing text or classifying data.
Games
#vpn
fromZDNET
1 month ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

Privacy professionals
fromWIRED
3 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
fromZDNET
1 month ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

Media industry
fromCornell Chronicle
1 month ago

Research Matters: Learning from 'the armpit of the internet' | Cornell Chronicle

Misinformation has escalated dramatically from three hoaxes yearly to three per second, intensified by AI technology and user sharing behavior on social media platforms.
Privacy technologies
fromZDNET
3 weeks ago

Firefox is adding a free VPN for all users - but can you trust it?

Mozilla is launching a free VPN for Firefox users, available March 24, with limitations on data usage.
Privacy professionals
fromWIRED
1 month ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Privacy technologies
fromZDNET
4 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy technologies
fromSecuritymagazine
1 month ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Miscellaneous
fromenglish.elpais.com
2 months ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
Gadgets
fromEngadget
2 months ago

How much do VPNs cost?

Compare VPNs using the same subscription duration and tier to avoid misleading advertised monthly rates and identify fair value.
US news
fromWIRED
1 month ago

An FBI 'Asset' Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

An FBI-controlled informant ran a staff role on the Incognito dark web market while allegedly approving fentanyl-tainted pill sales linked to at least one death.
US politics
fromArs Technica
2 months ago

DHS keeps trying and failing to unmask anonymous ICE critics online

DHS withdrew summonses seeking Meta account subscriber data for Instagram and Facebook accounts monitoring ICE after legal pushback over First Amendment concerns.
Artificial intelligence
fromApp Developer Magazine
1 year ago

DeepSeek often restricted globally

AI chatbots face uneven global access due to government restrictions, with DeepSeek most frequently banned across 13 countries, driven by data protection, security concerns, and regulatory compliance requirements.
#digital-privacy
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Information security
fromTheregister
1 month ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
fromwww.engadget.com
2 months ago

The best VPNs with free trials in 2026

A free trial to a virtual private network (VPN) can mean a few different things. Several of the best VPNs let you try them out without paying. A rare few, and only one on this list, let you try them without submitting payment information at all. Some VPNs have forever free plans that let you use them indefinitely without paying, as long as you're OK with some limits.
Gadgets
#internet-censorship
World news
fromwww.theguardian.com
1 month ago

Internet blackout is tool of desperate regime to isolate Iranians, say experts

Iran implemented a near-total internet blackout following military strikes, primarily through intentional government action rather than infrastructure damage, to prevent coordinated opposition and maintain regime control.
World news
fromwww.theguardian.com
1 month ago

Internet blackout is tool of desperate regime to isolate Iranians, say experts

Iran implemented a near-total internet blackout following military strikes, primarily through intentional government action rather than infrastructure damage, to prevent coordinated opposition and maintain regime control.
#vpn-security
fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

#splinternet
Privacy technologies
fromenglish.elpais.com
1 month ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
#tor
fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

Privacy technologies
fromZDNET
1 month ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
Privacy professionals
fromDataBreaches.Net
1 month ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Information security
fromTechCrunch
2 months ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
#residential-proxies
Information security
fromTheregister
2 months ago

Ransomware crims forced to take off-RAMP as FBI seizes forum

US law enforcement seized the RAMP cybercrime forum's domains, disrupting a major marketplace used by ransomware groups, extortionists, and initial access brokers.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
Privacy technologies
fromEngadget
7 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
Privacy technologies
fromCointelegraph
2 months ago

Why Privacy Coins Often Appear in Post-Hack Fund Flows

Privacy coins act as a temporary black box in a broader laundering pipeline after hacks, reducing traceability and delaying enforcement while facilitating cash-out attempts.
Privacy technologies
fromWIRED
1 month ago

How to Organize Safely in the Age of Surveillance

Grassroots organizing requires careful tradeoffs between openness and security to protect participants from extensive government surveillance and corporate data cooperation.
[ Load more ]