#tor

[ follow ]
Information security
fromEmptywheel
1 hour ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
Information security
fromEmptywheel
1 hour ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
Privacy technologies
fromZDNET
4 months ago

Tor browser's great - but for more complete privacy protection, you need to add this

Tor Browser encrypts and anonymizes only browser traffic; to protect other system network traffic install and use Tor itself, available free for Linux, macOS, Windows.
UK news
fromTheregister
4 months ago

MI6 upgrades dark web portal to recruit new spies

MI6 launched Silent Courier, a Tor-accessible dark web portal and published security guidance to enable secure contact and recruit foreign informants worldwide.
Information security
fromThe Hacker News
4 months ago

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

A TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.
Privacy technologies
fromZDNET
5 months ago

The one-click Linux app I use for instant online anonymity

Carburetor provides one-click Tor-based anonymity and encryption for all Linux desktop applications via a Flatpak, offering global protection beyond the Tor Browser.
[ Load more ]