Jump to content

Search the Community

Showing results for tags 'Tor'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 8 results

  1. Developers at the Tor Project are working towards releasing a patch to a critical vulnerability researchers planned to disclose at the Black Hat security conference that could de-anonymize Tor users. Black Hat recently announced their keynote briefing schedule, including one titled: “You Don’t Have to be the NSA to Break Tor: De-anonymizing Users on a Budget” by security researchers Alexander Volynkin & Michael McCord from Carnegie Mellon University’s Computer Emergency Response Team (CERT). Shortly after the conference schedule went live, the talk was canceled at the request of legal co
  2. Tor is still DHE 1024 (NSA crackable) After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys. Assuming no "breakthroughs", the NSA can spend $1 billion on custom chips that can break such a key in a few hours. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips. The problem with Tor is that it still uses these 1024 bit keys for much of its crypto, particularly because most people are still using older versions o
  3. By Kevin Poulsen 01.27.14 6:30 AM While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire e-mail database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of e-mail in unrelated investigations. The bureau’s data windfall, seized from a company called Freedom Hosting, surfaced in court papers last week when prosecutors indicted a Florida man for allegedly selling counterfeit credit cards online. The filings show the FBI built its case in part by executing a search warrant on a Gmail ac
  4. During the past year or so Hollywood has taken a renewed interest in sites that index the content of the worldwide Usenet system. As a result new sites are now quickly on the radars of the MPAA and therefore potential litigation targets. However, what the studios can’t find, they can’t kill, which makes the emergence of Tor-based operations of particular interest. The admin of one such site currently under development agreed to speak with TorrentFreak about his motivations. For various reasons 2012 was not a good year for Usenet indexing services. First, pressure on payment processors such as
  5. The Tor Project has begun blacklisting exit nodes vulnerable to the Heartbleed vulnerability in OpenSSL. Researcher Collin Mulliner, with the Systems Security Lab at Northeastern University in Boston, published the results of an experiment he conducted using a publicly disclosed Heartbleed proof-of-concept exploit against 5,000 Tor nodes. Mulliner said that 1,045 nodes, or a little more than 20 percent, were vulnerable to the bug. Mulliner said only Tor exit nodes were leaking plaintext user traffic, including host names, credentials and web content. Mulliner conducted his experiment for three
  6. We are living in an era of Mass Surveillance, conducted by the Government Agencies like the NSA and GCHQ, and we ourselves gave them an open invitation as we all have sensors in our pockets that track us everywhere we go i.e. Smartphone. Encryption and security are more important today than any other time in our history. So, the best proactive way to keep your tracks clear is - Always use only trusted privacy tools and services. The same folks behind the Anonymity Tool, Tor Browser Bundle is currently working on a new Privacy tool called 'Tor Instant Messaging Bundle' (TIMB), that will he
  7. Three years ago we wrote about how Austrian police had seized computers from someone running a Tor exit node. This kind of thing happens from time to time, but it appears that folks in Austria have taken it up a notch by... effectively now making it illegal to run a Tor exit node. According to the report, which was confirmed by the accused, the court found that running the node violated §12 of the Austrian penal code, which effectively says: Not only the immediate perpetrator commits a criminal action, but also anyone who appoints someone to carry it out, or anyone who otherwise contributes to
  8. Tor is not only one of the most powerful privacy tools to ever hit the Internet. Crucially, it's also becoming one of the easiest to use. This fall, Tor’s developers plan to release Stormy, a hidden service launcher that will make it as easy as a few clicks to publish an anonymous Deep Web site to the Tor network. Stormy 1.0, which has been in planning for some time, is scheduled for release on September 15, 2014, according to the Tor Project’s newly released two year roadmap. “We have a lot of people asking for [point-click-publish hidden services] around the world,” Andrew Lewman, Tor’s exe
  • Create New...