Hackers Expose Russian FSB Cyberattack Projects

More nation-state activity in cyberspace, this time from Russia: Per the different reports in Russian media, the files indicate that SyTech had worked since 2009 on a multitude of projects since 2009 for FSB unit 71330 and for fellow contractor Quantum. Projects include: Nautilus — a project for collecting data about social media users (such as Facebook, MySpace, and LinkedIn)…. Continue reading Hackers Expose Russian FSB Cyberattack Projects

How does cellular data differ from an ISP, and what can be tracked? [migrated]

Are IP addresses given to a phone static or not?

Also, how can phone companies keep track of a person if they wanted to find them? For example, I don’t have an account and use a pre-paid card.

I’m wondering how celluar data… Continue reading How does cellular data differ from an ISP, and what can be tracked? [migrated]

Does accessing a personally owned Tor node (that only you ever visit) over the Tor network break anonymity?

Does accessing a personally owned Tor node (that only you ever visit) over the Tor network break anonymity?

I read from a long guide by Whonix on how to properly use Tor that I shouldn’t ever access small personal clearnet w… Continue reading Does accessing a personally owned Tor node (that only you ever visit) over the Tor network break anonymity?

Do VPNs have upstream ISPs that log traffic (making VPN claims of having strict no-log policies pointless)?

Most VPNs claim to adhere to a strict no-log policy, but these claims are typically unproven and/or even downright false. For instance, if the VPN says they collect absolutely no logs, how will they know whether a subscriber … Continue reading Do VPNs have upstream ISPs that log traffic (making VPN claims of having strict no-log policies pointless)?