1. drmike

    Tor Users Isolated and Deanonymized via Hardware Data and Leaky Javascript - Proof of Concept

    Excellent security dev here done by this gent to show weakness in Tor. Simply said, bits of data available even with Tor bundled browser originating from mouse and other hardware.  Enough to make you think plausible to use such to identify user as being the same user seen elsewhere. Over...
  2. drmike

    ToR allegedly compromised by mass of rogue nodes and Carnegie Mellon Researchers + FBI This isn't breaking news per se.  Happened back in 2014.   Details are what is breaking per se. Carnegie Mellon University in Pittsburgh "researchers" funded by the FBI allegedly were able to attack ToR network and collect real IPs...
  3. DomainBop

    HORNET: 93 Gb/s Tor Alternative

    Proposed faster, more secure alternative to Tor: ABSTRACT We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus...
  4. A

    Redefined my vps requirements and looking for offers

    I'm hoping to find a VPS provider which meets the follwoing requirements: privacy taken seriously non US/UK based company server location preferably in Iceland, Norway, Netherlands, Sweden or Switzerland performance: ~ 30GB HDD, 1GB RAM, 100Mbit or 1Gbit connection, >2TB Traffic ignorance is a...
  5. texteditor

    Study finds that more than 80% of Tor Hidden Service visits are political dissidents

    Just kidding, it's totally pedophiles From Wired: Sooo, this means the remaining 20% are totally whistle-blowing freedom-fighters and dissidents, right? Well, at least 0.1% of them are
  6. drmike

    NSA classifies Linux Journal readers, Tor and Tails Linux users as "extremists"

    So all my fellow paranoid foil crafters... More leaks about the alphabet terror agencies targetting you innocent failure to opt into total surveillance.. NSA classifies Linux Journal readers, Tor and Tails Linux users as "extremists" Are you a Linux Journal reader or use software such as Tor...
  7. drmike

    TOR config - exit node - help the idiot.

    Being a new year I've decided to put some idle server resources on my dedicated servers to some use, benefiting others. Decided to give TOR a try.   The config is blah.  Haven't had success in getting it up and running as an exit node (i.e not seeing in public database and not seeing any real...
  8. drmike

    Blocking Tor Users and Tor Exit Nodes from Reaching Your Server

    So earlier tonight, vpsBoard was DDoS attacked offline.   The source,  malicious traffic from Tor. We've taken steps TO BLOCK TOR.   No more Tor traffic.  If you use it, get a VPN or Proxy or vpsBoard will probably not work much for you. This script is borrowed from Github and slightly...
  9. Aldryic C'boas

    Silk Road raided by the FBI And now I have this overwhelming urge to listen to Bobby Fuller.
  10. drmike

    FBI lures Tor Users with Malware

    FBI Admits Control of Malware-Spewing Tor Servers ...malware attack on the Tor network used a Firefox exploit to send the personal data of Tor users to an IP address in Reston, Virginia.  FBI's "computer and internet protocol address verifier" (CIPAV) spyware iniatiative.... a new Wired report...