Warning: Critical Tor Browser Vulnerability Leaks Users’ Real IP Address—Update Now

If you follow us on Twitter, you must be aware that since yesterday we have been warning Mac and Linux users of the Tor anonymity browser about a critical vulnerability that could leak their real IP addresses to potential attackers when they visit cert… Continue reading Warning: Critical Tor Browser Vulnerability Leaks Users’ Real IP Address—Update Now

The Tor Project to Beef Up Privacy with Next-Generation of Onion Services

The Tor Project has made some significant changes to its infrastructure by improving the way the ‘onion’ network protects its users’ privacy and security.

Since the beginning, the largest free online anonymity network has been helping users browse the… Continue reading The Tor Project to Beef Up Privacy with Next-Generation of Onion Services

Tor Launches Bug Bounty Program — Get Paid for Hacking!

With the growing number of cyber attacks and breaches, a significant number of companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded.

Following major companies and organisations, the non-profit group behind Tor Project – the largest online anonymity network that

Continue reading Tor Launches Bug Bounty Program — Get Paid for Hacking!

Tor Project Releases Sandboxed Tor Browser 0.0.2

The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – has launched an early alpha version of Sandboxed Tor Browser 0.0.2.

Yes, the Tor Project is working on a sandboxed version of the Tor Browser that would isolate the Tor Browser from other processes of the operating system and limit its ability to interact or

Continue reading Tor Project Releases Sandboxed Tor Browser 0.0.2

Warning: Over 100 Tor Nodes Found Designed to Spy On Deep Web Users

Researchers have discovered over 100 malicious nodes on the Tor anonymity network that are “misbehaving” and potentially spying on Dark Web sites that use Tor to mask the identities of their operators.

Two researchers, Amirali Sanatinia and Guevara No… Continue reading Warning: Over 100 Tor Nodes Found Designed to Spy On Deep Web Users

Core Tor Contributor Leaves Project; Shutting Down Important Tor Nodes

Another blow to the Tor Project: One of the Tor Project’s earliest contributors has decided to quit the project and shut down all of the important Tor nodes under his administration.

Lucky Green was part of the Tor Project before the anonymity network… Continue reading Core Tor Contributor Leaves Project; Shutting Down Important Tor Nodes

Here’s How Riffle Anonymity Network Protects Your Privacy better than Tor

Online privacy is an Internet buzzword nowadays. If you are also concerned about the privacy of your web surfing, the most efficient way is to use TOR – a free software that lets users communicate anonymously by hiding their actual location from snoopers.

Although TOR is a great anonymous network, it has some limitations that could still allow a motivated hacker to compromise the anonymity of

Continue reading Here’s How Riffle Anonymity Network Protects Your Privacy better than Tor

More than 1 million People now access Facebook Over Tor Network

In Brief
Facebook has hit another Milestone: More than 1 MILLION people, or you can say privacy conscious, are accessing Facebook over TOR.

Facebook proudly announced today that, this month, for the first time, the people connected to the anonymous version of Facebook that’s accessible only through the TOR anonymity network exceeded 1 Million – an increase of almost 100% in the past ten

Continue reading More than 1 million People now access Facebook Over Tor Network

FBI is fighting back against Judge’s Order to reveal TOR Exploit Code

Last month, the Federal Bureau of Investigation (FBI) was ordered to reveal the complete source code for the TOR exploit it used to hack visitors of the world’s largest dark web child pornography site, PlayPen.

Robert J. Bryan, the federal judge, ordered the FBI to hand over the TOR browser exploit code so that defence could better understand how the agency hacked over 1,000 computers and if

Continue reading FBI is fighting back against Judge’s Order to reveal TOR Exploit Code

Subgraph OS — Secure Linux Operating System for Non-Technical Users

Information security and privacy are consistently hot topics after Edward Snowden revelations of NSA’s global surveillance that brought the world’s attention towards data protection and encryption as never before.

Moreover, just days after Windows 1… Continue reading Subgraph OS — Secure Linux Operating System for Non-Technical Users