A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks

At one point, the group ran almost a quarter of all Tor exit nodes. Group still controls 10% of all Tor exit nodes today.

Attack on Tor Causes “v3 Onion” Downtime, Experimental Fix to Land Soon

V3 onion sites are down due to a bug that doesn’t preserve the “live” status of the consensus.

Should You Use a ‘Dark Web Scan’ to Protect Your Identity?

The dark web is a large, hidden network of websites not indexed or found on typical search engines.

5 Steps for Secure Malware Analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the infection occurs.

How to stop the onion denial (of service)

We would like to present you with two options that we believe can provide a long-term defense to the problem while maintaining the usability and security of onion services.

Onion Service version 2 deprecation timeline

As humankind’s understanding of math and cryptography evolved, the foundation of version 2 became fragile and at this point in time, unsafe.

How to run an SSH connection through Tor

One such method is with the help of Tor. With Tor, you can add a level of anonymity and even hide your services from prying/hacking eyes.

How To Make Anonymous Requests using TorRequests and Python

How To Make Anonymous Requests using TorRequests and Python

TorRequest is a wrapper around requests and stem libraries that allows making requests through TOR.

Scallion : GPU-Based Onion Hash Generator

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL.

Tor Exit Nodes Located and Mapped

Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet.

Loading...

Loaded All

已经没有更多文章了

Contact

Contact

邮箱: [email protected]

Back to top