Browsing tag

Anonymity

Security firm uses Twitter to disclose critical zero-day flaw in Tor Browser

Zerodium, an infosec and premium zero-day acquisition platform tweeted about the flaw in Tor browser on Monday. The infamous exploit vendor and buyer/seller of popular software vulnerabilities, Zerodium has revealed a critical flaw in Tor browser software. According to a tweet posted by Zerodium, the zero-day vulnerability is present in the NoScript browser plugin and can […]

GlobaLeaks – The Open-Source Whistleblowing Software

GlobaLeaks is open-source / free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and Digital Human Rights. For the user manual refer to the GlobaLeaks’s User Manual. For the developer documentation refer to the GlobaLeaks’s Developer Documentation. Features Configurable submission contexts and questionnaires Single and multiple recipients […]

Russia blocks 50 VPNs & Anonymizers amid Telegram crack down

On May 3rd, 2018, Russia’s media and communication regularity authority Roskomnadzor blocked over 50 virtual private networks (VPNs), Web Proxies and Anonymizers in the country amid its crackdown against the Telegram messaging service. So far, there has been no official announcement from Roskomnadzor but the Russian News Agency TASS has confirmed the censorship and reported that the decision affects those services […]

HotSpot Shield, PureVPN & ZenMate found leaking users real IP addresses

According to VPN Mentor, a privacy advocate firm which reviews virtual private networks (VPN), after an in-depth research, it has been discovered that three VPN service providers with millions of customers worldwide are leaking sensitive data such as users’ IP addresses – These VPNs include HotSpot Shield, PureVPN, and Zenmate. What is a VPN used for? The purpose of using […]

MIT’s ‘Veil’ Fixes Holes In Private Browsing Modes To Boost Anonymity

Web browsers’ private browsing mode is the first resolution taken by most users to protect their privacy online. But subconsciously they’re aware that the private mode or incognito mode is doing nothing but deleting the browsing activity from their computer. According to past studies, it’s possible to track people’s browsing habits even when privacy mode is […]

GlobaLeaks – Open-Source Whistleblowing Framework

GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and Digital Human Rights.  It is an Open Whistleblowing Framework that can be used in many different usage scenarios that may require very different approaches to obtain both security and flexibility.    Features Configurable contexts Configurable submission […]

Flaw in Tor Browser Leads to Leaking of Your Real IP Address

Tor is a unique web browser because it lets users surf the web while keeping their real IP address hidden. It has lately become quite popular among users who are privacy conscious and prefer to use the web anonymously. However, if you are accessing Tor via Mac or Linux machine, then you need to be […]

TorWall – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also intercepts and handles DNS requests preventing potential leaks. Tallow has several applications, including: “Tor-ifying” applications there were never designed to use Tor […]

The Loopix Anonymity System Can Be A Good Tor Alternative, Comparison Shows

Loopix is another name that adds to the list of anonymity networks like Tor. It is developed by the researchers at the University College London (UCL) and published in a research paper titled “The Loopix Anonymity System.” As Bleeping Computer points out, Loopix works similarly as Tor. It’s a type of mix network which use a […]

Get $1M for reporting zero-day flaws in Tor to “help Govt fight crime”

Usually, a bug bounty program helps companies secure their software and products from zero day vulnerabilities that can cause massive damage if cyber criminals get their hands on them. But Zerodium, an American information security company, and premium zero-day acquisition platform have launched a Tor Browser Zero-Day Bounty; the purpose of which is to get hackers and security researchers to […]

Chinese Man Who Sold VPNs Gets 9 Months Prison Sentence

In July this year, it was reported that Apple had removed all major VPN apps from Chinese App Store on the request of the government. Now reports are that Deng Jiewei from Guangdong province has been charged with illegally selling virtual private network (VPN) software – He will serve nine months in prison. Jiewei who worked along with a […]

Web Host Asked to handover IP Addresses of Anti-Trump Website Visitors

In total, the government of United States is asking for 1.3 million users who visited the website – RIP Privacy! The website www.disruptj20.org turned out to be the ultimate platform for anti-Trump protestors at the time when US president Donald Trump was being inaugurated. Reportedly, around 1.3 million people visited this website to vent out […]

Apple has removed all major VPN apps from Chinese App Store

China is well known for its online censorship and surveillance tactics, but earlier today news broke that Apple has removed all virtual private network (VPN) apps from App Store in China. This means Apple users in China can not avail online anonymity anymore and their privacy is at high risk. ExpressVPN, a British Virgin Islands-based VPN provider, […]

Tor Public Bug Bounty Program: Earn Up To $4000

There is some excellent news for researchers and white hat hackers out there. On Thursday the popular anonymity network Tor project launched its public bug bounty program. This program will help researchers earn thousands of dollars since up to $4000 are being offered for finding out vulnerabilities. The program has been launched on the HackerOne […]

Tor vs VPN? What’s Best And Which One Should I Use?

Short Bytes: TOR vs VPN, a futile discussion that has been in existence since the last five to ten years. The two are different technologies but they are designed to fulfill the same purpose, anonymity and unrestricted access. However, there are some different Tor and VPN which you might want to consider before choosing one of […]

Russian Tor Relay Operator Facing Terrorism Charges

The Russian police have arrested Tor node operator Dmitry Bogatov. They charged him with terrorism offense and the reason for this, as they claim, is the connection between his IP address and a series of posts allegedly inciting dissent and disorder. Bogatov, a mathematics lecturer at Moscow’s Finance and Law University was arrested on April […]

How to Install TOR on Android and iOS Devices

You can safeguard your online privacy when you are using an Android or iOS device to browse the internet by using TOR. TOR hides and occasionally changes your IP address when you are online. Thus, when you are using TOR on either of these devices, your privacy and identity will be safe when you visit […]

Tor and Its 10 Best Alternatives

The Onion Router (TOR) has been one of the most secure and reliable methods that people have been using to access the internet since the early 2000s. The essence of the TOR network is that you can comfortably access the internet as an entirely anonymous entity, overcome all manner of geo-restrictions and even access the […]

Why You Should Use These 5 VPN Services

There are hundreds of VPN services on the market currently. The demand for VPN services has been on the rise in the recent past, thanks to the trend in which governments in various countries around the world are adopting legislation that limits the digital privacy rights of individuals. The problem is that you may find […]