Home » Tag Archives: tor

Tag Archives: tor

Brave Web Browser Implements Private Tabs That Use Tor

The latest release of the Brave web browser includes a new privacy feature that is in beta testing. When a private tab is opened in version 0.23 of the Brave web browser, users now have the option to enable the new privacy feature that uses Tor onion routing to help increase privacy. This new feature makes private tabs actually private, ... Read More »

Cloudflare Integrates Tor Hidden Services to its DNS Services

Cloudflare has launched Tor integrated DNS services. The service is a Domain Name System (DNS) resolver which is similar to URLs such as ‘Cloudflare.com’ with their specific and corresponding numerical IP addresses. This helps users locate where a given domain is geographically hosted and can thereafter match it up with associated servers and hardware devices. This means that the name ... Read More »

Tor Project Ended Tor Messenger Development

The Tor Project announced the discontinuation of Tor Messenger, a messaging platform that incorporated Tor and OTR by default. In a blog post about the end of Tor Messenger support, the Tor Project gave three reasons for the decision. One of the more pressing reasons for ending Tor Messenger support, the blog post explained, was Florian Quèze’s discontinuation of Instantbird ... Read More »

Eavesdropping On Tor Exit Nodes

In the last article, I talked about the appropriate configuration of the Tor browser and the steps to follow to further strengthen our privacy. Now, we’ll see how it is possible to have our data leaked even if our Tor browser is working in the right manner. The first thing to point out, is that Tor encrypts our communication only ... Read More »

The Italian ANAC launched online whistleblowing platform using Tor onion services

The Italian National Anti-Corruption Authority (ANAC) has embraced and thereafter launched an online whistleblower platform using Tor onion services. This is expected to encourage and help whistleblowing to manage and expose illegal activities such as corruption cases in government organizations at the same time protecting individual identities. Millions of people make use of the Tor network daily and globally to ... Read More »

Tor anonymizers.jpg

How To Configure Tor Properly

Tor is a renowned must in the anonymity field, and the first fundamental step in your fight for privacy. You could think that the only thing that you need to hide your identity while surfing the web is to download the Tor browser bundle, but this is not enough. There are, in fact, wrong behaviours that can reveal your real ... Read More »

Leak Shows US Army and NSA Compromised Tor, I2P, VPNs and Wants to Track Monero

A photograph showing an alleged leaked Army document revealing a joint project to track anonymous cryptocurrencies seems to have come from a somewhat unlikely place. The photograph reveals some interesting things, one of which is the revelation that the National Security Agency (NSA) is conducting a joint project with the US Army’s Cyber Protection Team (CPT) from the Cyber Protection ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

Novel Defense Techniques To Secure Tor Communications – A Research Study

The Tor network depends mainly on resources, which are owned and managed by volunteers, to cater daily for millions of internet users seeking to maintain high levels of anonymity and privacy. As such, these resources have to be efficiently managed, by the Tor network, while also dealing with challenges facing its utility and robustness. A large percentage of the challenges ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

Mozilla Quietly Adds Features From Tor Browser to Firefox

In 2017, the developers at Mozilla have quietly added several features to Firefox that originated from the Tor Project’s Tor Browser. The new features come from the Tor Uplift project, which helps Mozilla integrate patches to Firefox that are used in the Tor Browser. The Tor Uplift project patches to Firefox help increase privacy and security, and the project has ... Read More »

Tor anonymizers.jpg

Tor Browser Updates Patch IP Leaking TorMoil Bug

With the new updates in Tor Browser version 7.0.9 for Linux and Mac operating systems, Tor is now patched up from a new vulnerability that was recently discovered that would cause Tor Browser to leak the IP address of its user. The vulnerability was given the name TorMoil by the person who discovered, Filippo Cavallarin of wearesegment.com. The bug does ... Read More »

The New York Times Launches a Tor Version of their Website

While many people think the dark web is no good except for buying drugs and guns, a new innovation has now made it possible to also read the news on the same platform. The New York Times announced on the 27th of last month that it was launching a Tor Onion Service of its website, at the address, https://www.nytimes3xbfgragh.onion.sale/. The ... Read More »

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »