Ransomware gets a lot faster by encrypting the master file table instead of...
In just a few short years, ransomware -- malware that encrypts all the files on the computer and then charges you for a key to restore them -- has gone from a clever literary device for...
View ArticleArtist installs sculptures that are also Tor nodes in the world's galleries
Trevor Paglen and Jacob Appelbaum collaborate to create beautiful, acrylic-encased computers that are also Tor nodes, anonymizing data that passes through them, and install the in art galleries all...
View ArticleUS government and SCOTUS change cybercrime rules to let cops hack victims'...
The Supreme Court -- at the behest of the US government -- has announced changes to "Rule 41," a crucial procedure of the US court system, which will give law enforcement sweeping powers to hack into...
View ArticleFBI has been harassing a Tor developer since 2015, won't tell her or her...
Since November 2015, FBI agents have been trying to get Tor developer Isis Agora Lovecruft to meet with them, but they won't tell her or her lawyer why. (more…)
View ArticleTor Project is working on a web-wide random number generator
Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. (more…)
View ArticleUnited Arab Emirates hacked UK journalist
A new research report from Citizenlab painstaking traces the origins of a series of sophisticated hacking attacks launched at Rori Donaghy, a UK journalist for Middle East Eye who founded the Emirates...
View ArticleJacob Appelbaum, Tor developer and Wikileaks staffer, resigns amid sex abuse...
Appelbaum, whose work has put him in the crosshairs of his own government and foreign states, resigned from the Tor project on Friday, accompanied by a short note from Tor executive director Shari...
View ArticleDon't let the government hack your computer. Tell Congress to stop changes to...
“The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack,” the EFF says. “The changes to Rule 41 would make it easier...
View ArticleResearchers find over 100 spying Tor nodes that attempt to compromise darknet...
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or...
View ArticleDoJ to judges: use Tor to protect your internet connection
This summer, DoJ Cybercrime Lab director Ovie Carroll presented at a Federal Judicial Seminar in San Diego, attended by over 100 US federal judges, where he recommended that the judges should use Tor...
View ArticleThe Tor Project's social contract: we will not backdoor Tor
I first encountered the idea of "social contracts" for software projects in Neal Stephenson's seminal essay In the Beginning Was the Command Line, which endorsed the Debian project on the strength of...
View ArticleI have found a secret tunnel that runs underneath the phone companies and...
Calyx is a famous, heroic, radical ISP that has been involved in groundbreaking litigation -- they were the first company to ever get a secret Patriot Act warrant unsealed, fighting for 11 years to...
View ArticleTen principles for user-protection in hostile states
The Tor Project's "Ten Principles for User Protection in Hostile States" is both thoughtful and thought-provoking -- it's a list that excites my interest as someone who cares about the use of...
View ArticleBarcelona government officially endorses Tor-based whistleblower platform
Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a...
View ArticleHow to keep your secret activist Twitter account a secret
Despite his widely read criticism of Tor, The Gruqq -- a legendary, pseudonymous security expert -- uses it as first and last line of defense in keeping your secret, activist Twitter account a secret....
View ArticleWhat not to do when you're anonymous, if you want to stay that way
If you're using an anonymity tool -- Tor or something like it -- to be anonymous on the internet, it's really easy to screw it up and do something that would allow an adversary of varying degrees of...
View ArticleSecuring the IoT: a tele-dildo controlled through the Tor network
Security researcher Sarah Jamie Lewis wanted to demonstrate that the horrific stories of insecure networked sex-toys (and other Internet of Things devices) was the result of manufacturers' negligence,...
View ArticleCyber-arms dealer offers $1m for zero-day Tor hacks
Zerodium is a cyber-arms dealer that produces hacking tools for governments by buying up newly discovered defects in widely used systems, weaponizing them and then selling them to be used against...
View ArticleThe New York Times is now a Tor onion service
The New York Times is now available as an "Onion Service" on the Tor network, at the address https://www.nytimes3xbfgragh.onion/ -- meaning that anyone with Tor access can securely and privately...
View ArticleCloudflare terminate Sci-Hub domains, declining to challenge court order
Cloudflare has terminated service to Sci-Hub, the site that provides paywall-free access to virtually all scholarly work, citing Aaron Swartz as inspiration -- Cloudflare previously serviced the...
View ArticleMap of the dark web
The so-called dark web is now so big that mapping efforts are afoot. It feels a bit like the web in the 1990s! The creators explain: The Dark Web Map is a visualization of the structure of Tor's onion...
View ArticleIndie UK mobile carrier announces a Tor-only SIM that blocks unencrypted data
Getting all your data to flow through the Tor network can be tricky -- the desktop Tor Browser only tunnels your web-traffic through the privacy-protecting service, and the mobile apps can be tricky...
View ArticleAn alternative to Wikileaks, new website says it'll leak Russian oligarch and...
Move over Wikileaks. A new leak site, Distributed Denial of Secrets (Tor), co-founded by "transparency activist" Emma Best, says they will leak hundreds of thousands of emails tomorrow, according to...
View ArticleFirefox is getting more browser fingerprinting protection courtesy of Tor...
Even if you block cookies, many sites still track you with "browser fingerprinting," that use the unique combination of your screen resolution, browser and OS version, installed fonts and plugins, and...
View ArticleOne way to determine whether your publisher is happy with your work
Being a Tor author is pretty swell. (Thanks, Patrick!) Read the rest
View ArticleBBC launches a Tor hidden service mirror to help people evade their...
If you're in China, Iran or some other country whose national firewall blocks BBC News, you can still access it over the Tor network at bbcnewsv2vjtpsuy.onion, which mirrors the main BBC News site as...
View ArticleA new audio anthology of free horror stories from Tor Nightfire
In October 2019, acclaimed sci-fi/fantasy publisher Tor released an audio anthology of 35 short stories to celebrate the launch of its new horror imprint, Nightfire. And now, they've done again —...
View ArticleYou can now listen to "The Three Body Problem" as a serialized podcast
A few years ago, Tor Books teamed up with playwright Mac Rogers to produce a free serialized fiction podcast called Steal The Stars, which was then adapted into a prose novel. Steal The Stars was a...
View ArticleChuck Tingle to go mainstream with new books published by Tor / Nightfire
World's greatest author Chuck Tingle has made the leap to the "Big Five," according to a recent release in Publishers Marketplace: CAMP DAMASCUS (coming 2023)BURY YOUR GAYS (coming 2024)always wanted...
View Article