proxy anonymity level, what is the tehnical difference ? (specific example from hide my name)

By using hidemy name I can check for a proxy if it is up or down, and also check the anonymity level using the app. A sample result looks like this:
IP address Port Country, City Speed Type Anonymity
72.195.114.169 4145… Continue reading proxy anonymity level, what is the tehnical difference ? (specific example from hide my name)

How does a website figure out the user’s identity, even if I am using new IP and new browser cookie? [duplicate]

Background: I recently came across a child porn website and by US law I am obliged to report it. I’ve decided to collect evidence for a formal report; however, I don’t want to reveal my identity due to the fear of retaliation.
To collect e… Continue reading How does a website figure out the user’s identity, even if I am using new IP and new browser cookie? [duplicate]

The Decoupling Principle

This is a really interesting paper that discusses what the authors call the Decoupling Principle:

The idea is simple, yet previously not clearly articulated: to ensure privacy, information should be divided architecturally and institutionally such that each entity has only the information they need to perform their relevant function. Architectural decoupling entails splitting functionality for different fundamental actions in a system, such as decoupling authentication (proving who is allowed to use the network) from connectivity (establishing session state for communicating). Institutional decoupling entails splitting what information remains between non-colluding entities, such as distinct companies or network operators, or between a user and network peers. This decoupling makes service providers individually breach-proof, as they each have little or no sensitive data that can be lost to hackers. Put simply, the Decoupling Principle suggests always separating who you are from what you do…

Continue reading The Decoupling Principle

OnionPoison – Fake Tor Browser Installer Spreading Malware Via YouTube

By Waqas
Threat actors are using YouTube’s video description feature to spread the fake Tor browser through a malicious website.
This is a post from HackRead.com Read the original post: OnionPoison – Fake Tor Browser Installer Spreading Malware V… Continue reading OnionPoison – Fake Tor Browser Installer Spreading Malware Via YouTube