The co-creator of the Tor network confirmed that the Tor Project team is working to identify and fix the bug announced by researchers at Carnegie Mellon. Tor network is a system designed to anonymize user’s experience on the web, allowing the publishing of content in the part of web non indexed by search engines, dubbed DeepWeb. A […]
Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000. Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and […]
The presence of nearly 380 servers in the Tor Network, 12 percent of the exit capacity, running the vulnerable version of OpenSSL could have compromised user’s anonymity. The Heartbleed bug is the flaw in the popular OpenSSL library that is scaring the security communities, many security experts hiphotesized that Intelligence agencies, including NSA, have exploited the bug to spy on […]
The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of Tor project. In reality […]
Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know very well Tor network and the capability of the system to remain anonymous under specific conditions. We have used terms such as Deep Web, Dark web and hidden web to remark […]
NEW MAC MALWARE HAS BEEN DISCOVERED BY JACOB APPELBAUM ON ATTENDEE COMPUTER AT OSLO FREEDOM FORUM WHERE IS DEBATED ALSO GOVERNMENT SURVEILLANCE. A new Mac Malware has been detected at recent Oslo Freedom Forum workshop, the concerning discovery has been made by the popular security expert Jacob Appelbaum. “Hundreds of the world’s most influential dissidents, innovators, journalists, philanthropists, and […]
Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet, intelligence agencies are making great investments in term of money and resources to define new methods and to […]
On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor. There are pro and cons for this design choice, of course the greatest advantage resides in the difficulty for the localization of the […]
Virtual currency schemas, despite used by large communities, face with intrinsic instability that makes them not ideal for investments for financial entities. Banking systems represents the unique opportunity for investors that while accepting the risks related to financial transactions don’t want to work with a currency with no real equivalent or that it is managed […]
After the publishing of the book “Deep Dark Web” many colleagues asked me to explain how does work the finance in hidden world and which is the currency used for the transactions? Of course I receive many question also on Bitcoin by common people so I decided to introduce the basic concepts behind the famous […]