TOR’s Anonymity Promise Slashed- Users can be Tracked with their Mouse Movements! TOR is used by probably millions of Internet users simply...
Short Bytes: While TOR software suite promises enhanced privacy and security, researchers have found new ways like TOR user fingerprinting to unmask...
A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
‘Sybil’ nodes could be used to de-anonymise traffic. The Tor Project is working with Princeton University boffins to try and identify possibly malicious...
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In...
Ricochet is the most secure encrypted anonymous messenger that sends no metadata. The security experts have approved a new internet messaging tool...
Some Tor servers may leak timezone info via gzipped files. Jose Carlos Norte, developer for the eyeOS virtual desktop project, has discovered an...
Tor Project patches critical bug but refuses to acknowledge the bug discovery by a security researcher. Tor Project’s website had a critical cross-site...
Default Settings In Apache Servers Can Leak Details about Tor traffic. This has happened the second time in this week. Leaving default setting...
Short Bytes: Tor Browser 5.5 is the first stable release in the 5.5 series of Tor. It is released for all the...
Short Bytes: Using the publicly available data, data visualization software firm Uncharted has prepared TorFlow — a map for visualizing how TOR’s...
Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle...
Short Bytes: If you are interested in increasing the security and privacy of your network traffic, here’s a great news for you....
THE SO-CALLED DARK web, for all its notoriety as a haven for criminals and drug dealers, is slowly starting to look more...
Short Bytes: Last year, the FBI engaged in the largest ever law enforcement hacking campaign to shut down “the largest remaining known...
Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But...
IT’S BEEN MORE than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity...
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community....
Image: fossBytes Short Bytes: A Tails live-USB is like a security-focused computer in a tiny box. Edward Snowden used the same OS...
Researchers are still looking for a Tor alternative.Scientists at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) have created an anonymous...