The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to […]
Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know very well Tor network and the capability of the system to remain anonymous under specific conditions. We have used terms such as Deep Web, Dark web and hidden web to remark […]
Alleged members of the hacker collective Anonymous posted alleged passwords of Hill staffers, but according expert they are outdated and inaccurate. Anonymous claimed to have stolen credentials of members of Congress to protest against the popular surveillance program PRISM. Anonymous is back and once again it targeted US institutions, the group leaked over 2000 username […]
Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizonâs users. The security experts revealed to the Reuters agency that it is possible to hack Verizon mobile phones for surveillance purpose, the researchers will present the discovery during the next hacking conferences this summer, the DEF […]
The guardian issued new top secret documents gathered by Edward Snowden demonstrating the intense collaboration between Microsoft and US government. Edward Snowden has issued new top secret documents demonstrating the intense collaboration between Microsoft and US government, in particular the whistleblower revealed the support received by the NSAÂ that obtained by the company the access to […]
Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press … The Guardian published new uncomfortable documents that revealed another surveillance program dubbed Stellar Wind that was started in 2001, after the tragic events of 9/11. According to the secret documents obtained by the Guardian, the program was authorized by President George W. […]
Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications. Operation Tempora, this is the name of last massive tapping program conducted by Britain’s Government Communications Headquarters (GCHQ) and revealed by The Guardian. Operation Tempora has been going on for at least 18 months, British intelligence adopted “intercept probes” […]
Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]
The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made ââby the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]
The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]