Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Early 2014, […]
The Russian government has launched a public competition, reserved to Russian entities, offering $111,000 to break Tor encryption. As anticipated in my previous post, law enforcement agencies and intelligence all over the world are investing to de-anonymize users in the deepweb, and in particular on Tor networks. Hacking Tor is a goal for many Intelligence agencies as […]
A group of researchers discovered a vulnerability in WhatsApp “Location Share” feature which exposes user’s location to the attackers. Security issues related to WhatsApp application are not a novelty, so popular application are continuously targeted by hackers and security experts that search for vulnerabilities to exploit. Early 2014 experts at Praetorian have been conducting the Project Neptune to […]
Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study  conducted to test Tor network exit nodes for sneaky behavior, it has been discovered that a not specified Russian […]