Artist installs sculptures that are also Tor nodes in the world's galleries
Trevor Paglen and Jacob Appelbaum collaborate to create beautiful, acrylic-encased computers that are also Tor nodes, anonymizing data that passes through them, and install the in art galleries all...
View ArticleUS government and SCOTUS change cybercrime rules to let cops hack victims'...
The Supreme Court -- at the behest of the US government -- has announced changes to "Rule 41," a crucial procedure of the US court system, which will give law enforcement sweeping powers to hack into...
View ArticleFBI has been harassing a Tor developer since 2015, won't tell her or her...
Since November 2015, FBI agents have been trying to get Tor developer Isis Agora Lovecruft to meet with them, but they won't tell her or her lawyer why. (more…)
View ArticleTor Project is working on a web-wide random number generator
Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. (more…)
View ArticleUnited Arab Emirates hacked UK journalist
A new research report from Citizenlab painstaking traces the origins of a series of sophisticated hacking attacks launched at Rori Donaghy, a UK journalist for Middle East Eye who founded the Emirates...
View ArticleJacob Appelbaum, Tor developer and Wikileaks staffer, resigns amid sex abuse...
Appelbaum, whose work has put him in the crosshairs of his own government and foreign states, resigned from the Tor project on Friday, accompanied by a short note from Tor executive director Shari...
View ArticleDon't let the government hack your computer. Tell Congress to stop changes to...
“The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack,” the EFF says. “The changes to Rule 41 would make it easier...
View ArticleResearchers find over 100 spying Tor nodes that attempt to compromise darknet...
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or...
View ArticleDoJ to judges: use Tor to protect your internet connection
This summer, DoJ Cybercrime Lab director Ovie Carroll presented at a Federal Judicial Seminar in San Diego, attended by over 100 US federal judges, where he recommended that the judges should use Tor...
View ArticleThe Tor Project's social contract: we will not backdoor Tor
I first encountered the idea of "social contracts" for software projects in Neal Stephenson's seminal essay In the Beginning Was the Command Line, which endorsed the Debian project on the strength of...
View ArticleI have found a secret tunnel that runs underneath the phone companies and...
Calyx is a famous, heroic, radical ISP that has been involved in groundbreaking litigation -- they were the first company to ever get a secret Patriot Act warrant unsealed, fighting for 11 years to...
View ArticleTen principles for user-protection in hostile states
The Tor Project's "Ten Principles for User Protection in Hostile States" is both thoughtful and thought-provoking -- it's a list that excites my interest as someone who cares about the use of...
View ArticleBarcelona government officially endorses Tor-based whistleblower platform
Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a...
View ArticleHow to keep your secret activist Twitter account a secret
Despite his widely read criticism of Tor, The Gruqq -- a legendary, pseudonymous security expert -- uses it as first and last line of defense in keeping your secret, activist Twitter account a secret....
View ArticleWhat not to do when you're anonymous, if you want to stay that way
If you're using an anonymity tool -- Tor or something like it -- to be anonymous on the internet, it's really easy to screw it up and do something that would allow an adversary of varying degrees of...
View ArticleSecuring the IoT: a tele-dildo controlled through the Tor network
Security researcher Sarah Jamie Lewis wanted to demonstrate that the horrific stories of insecure networked sex-toys (and other Internet of Things devices) was the result of manufacturers' negligence,...
View ArticleCyber-arms dealer offers $1m for zero-day Tor hacks
Zerodium is a cyber-arms dealer that produces hacking tools for governments by buying up newly discovered defects in widely used systems, weaponizing them and then selling them to be used against...
View ArticleThe New York Times is now a Tor onion service
The New York Times is now available as an "Onion Service" on the Tor network, at the address https://www.nytimes3xbfgragh.onion/ -- meaning that anyone with Tor access can securely and privately...
View ArticleCloudflare terminate Sci-Hub domains, declining to challenge court order
Cloudflare has terminated service to Sci-Hub, the site that provides paywall-free access to virtually all scholarly work, citing Aaron Swartz as inspiration -- Cloudflare previously serviced the...
View Article