#tor-network

[ follow ]
fromThe Hacker News
1 month ago

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Misconfigured Docker instances are targeted for cryptocurrency mining through Tor usage to conceal attacker activities.
Privacy technologies
fromZDNET
1 month ago

This Linux distro routes all your traffic through the Tor network - and it's my new favorite for privacy

Securonis is a Linux distribution that ensures privacy by routing traffic through Tor and includes user-friendly tools for protection.
[ Load more ]