TOR, Mozilla Cozy Up

via Lucian Armasu, writing at Tom’s Hardware, comes news of Project Fusion, a partnership – if-you-will of the Tor Project and Mozilla, in an effort to provision enhanced privacy and security to the Open Source browser. Today’s Must Read!
The post TOR… Continue reading TOR, Mozilla Cozy Up

Do Tor relays require knowledge of the real IP address of a hidden service, to enable routing to it?

From what I have read so far from the internet, in order to use the hidden service, the hidden service contacts random TOR relays and sends the public key to them. The hidden service also signs a hidden service descriptor and… Continue reading Do Tor relays require knowledge of the real IP address of a hidden service, to enable routing to it?

Do Tor relays require knowledge of the real IP address of a hidden service, to enable routing to it?

From what I have read so far from the internet, in order to use the hidden service, the hidden service contacts random TOR relays and sends the public key to them. The hidden service also signs a hidden service descriptor and… Continue reading Do Tor relays require knowledge of the real IP address of a hidden service, to enable routing to it?

Tor Launches Bug Bounty Program — Get Paid for Hacking!

With the growing number of cyber attacks and breaches, a significant number of companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded.

Following major companies and organisations, the non-profit group behind Tor Project – the largest online anonymity network that

Continue reading Tor Launches Bug Bounty Program — Get Paid for Hacking!

Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’

Nearly two years to the day since Andrew Lewman quit his job as executive director of Tor, the anonymity software meant to shield users from government intervention, he found himself rushing between meetings with European law enforcement. Boosted by endorsements from internet activists like Julian Assange and Edward Snowden, Lewman had been at the helm of Tor as it became synonymous with internet user privacy. Now, as the newly minted vice president of dark web intel firm OWL Cybersecurity, his meetings with governments have gone from educating officials on how people use Tor to helping law enforcement investigate criminal activity occurring on Tor. As Lewman spoke to CyberScoop last month in between two of those meetings, it became clear that his perspective on the software has shifted. “What’s changed most about Tor is the drug markets have taken over,” Lewman said. “We had all these hopeful things in the beginning but ever since Silk Road has proven you […]

The post Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’ appeared first on Cyberscoop.

Continue reading Tor’s ex-director: ‘The criminal use of Tor has become overwhelming’

any encryption technique to use for constant-size path secret construction and verification?

Goal:

Deliver a message along a given routing path ABC with three nodes/steps A, B, and C.

Generate a secret out of the path info and encapsulate it in the message.

The path secret should be locally verified at each step…. Continue reading any encryption technique to use for constant-size path secret construction and verification?