NH bill would explicitly allow libraries to run Tor exit nodes
Inspired by the Library Freedom Project's uncompromising bravery in the face of a DHS threat against a town library in Kilton, NH, that was running a Tor exit node to facilitate private, anonymous...
View ArticleFirst-ever Tor node in a Canadian library
Library workers at Western University's Graduate Resource Centre in London, Ontario, had a workshop from Alison Macrina, the library organiser whose Library Freedom Project won a battle with the US...
View ArticleSecurity-conscious darkweb crime marketplaces institute world-leading...
If you are a seller on Alphabay -- a darkweb site that sells "drugs, stolen data and hacking tools," you'll have to use two-factor authentication (based on PGP/GPG) for all your logins. What's more,...
View ArticleRansomware gets a lot faster by encrypting the master file table instead of...
In just a few short years, ransomware -- malware that encrypts all the files on the computer and then charges you for a key to restore them -- has gone from a clever literary device for...
View ArticleHow libraries can save the Internet of Things from the Web's centralized fate
The American Library Association Code of Ethics says: ”We have a special obligation to ensure the free flow of information and ideas to present and future generations.” That free flow of information...
View ArticleArtist installs sculptures that are also Tor nodes in the world's galleries
Trevor Paglen and Jacob Appelbaum collaborate to create beautiful, acrylic-encased computers that are also Tor nodes, anonymizing data that passes through them, and install the in art galleries all...
View ArticleUS government and SCOTUS change cybercrime rules to let cops hack victims'...
The Supreme Court -- at the behest of the US government -- has announced changes to "Rule 41," a crucial procedure of the US court system, which will give law enforcement sweeping powers to hack into...
View ArticleFBI has been harassing a Tor developer since 2015, won't tell her or her...
Since November 2015, FBI agents have been trying to get Tor developer Isis Agora Lovecruft to meet with them, but they won't tell her or her lawyer why. Lovecruft is a well know cryptographer who...
View ArticleTor Project is working on a web-wide random number generator
Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. The Tor...
View ArticleUnited Arab Emirates hacked UK journalist
A new research report from Citizenlab painstaking traces the origins of a series of sophisticated hacking attacks launched at Rori Donaghy, a UK journalist for Middle East Eye who founded the Emirates...
View ArticleJacob Appelbaum, Tor developer and Wikileaks staffer, resigns amid sex abuse...
Appelbaum, whose work has put him in the crosshairs of his own government and foreign states, resigned from the Tor project on Friday, accompanied by a short note from Tor executive director Shari...
View ArticleDon't let the government hack your computer. Tell Congress to stop changes to...
“The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack,” the EFF says. “The changes to Rule 41 would make it easier...
View ArticleResearchers find over 100 spying Tor nodes that attempt to compromise darknet...
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or...
View ArticleDoJ to judges: use Tor to protect your internet connection
This summer, DoJ Cybercrime Lab director Ovie Carroll presented at a Federal Judicial Seminar in San Diego, attended by over 100 US federal judges, where he recommended that the judges should use Tor...
View ArticleThe Tor Project's social contract: we will not backdoor Tor
I first encountered the idea of "social contracts" for software projects in Neal Stephenson's seminal essay In the Beginning Was the Command Line, which endorsed the Debian project on the strength of...
View ArticleI have found a secret tunnel that runs underneath the phone companies and...
Calyx is a famous, heroic, radical ISP that has been involved in groundbreaking litigation -- they were the first company to ever get a secret Patriot Act warrant unsealed, fighting for 11 years to...
View ArticleTen principles for user-protection in hostile states
The Tor Project's "Ten Principles for User Protection in Hostile States" is both thoughtful and thought-provoking -- it's a list that excites my interest as someone who cares about the use of...
View ArticleBarcelona government officially endorses Tor-based whistleblower platform
Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a...
View ArticleHow to keep your secret activist Twitter account a secret
Despite his widely read criticism of Tor, The Gruqq -- a legendary, pseudonymous security expert -- uses it as first and last line of defense in keeping your secret, activist Twitter account a secret....
View ArticleWhat not to do when you're anonymous, if you want to stay that way
If you're using an anonymity tool -- Tor or something like it -- to be anonymous on the internet, it's really easy to screw it up and do something that would allow an adversary of varying degrees of...
View Article
More Pages to Explore .....