Home » Tag Archives: tor (page 2)

Tag Archives: tor

Terrorist Used Tor to Connect with ISIS, Source Said

The background and profiles of the terrorists connected to the London Bridge and Borough Market attack are still full of holes waiting to be filled. And as with any incident of this scale, the conspiracy between an organization’s affiliates can eventually spin off into something entirely unrelated. One such example is the recent demonization of encryption in the UK—a topic ... Read More »

Tor 7.0 Released with Content Sandbox and Multi-process Mode

Tor Browser 7.0 is the new version of the web browser specialized in private navigation and is a fundamental part of the Open Source communications network system Tor, which aims to achieve anonymity at the network level. With the advent of Tor Browser 7.0, we have new security measures and many changes to remain anonymous on the Internet. Here, you will find all the changes and ... Read More »

French Police Seized Tor Relays in WannaCry Investigation

On March 17, news outlets reported the sudden absence of several French Tor relays. Further data revealed that law enforcement agencies in France seized the the relays in connection with the investigation into WannaCrypt. WannaCrypt, the ransomware that struck “more than 200,000 devices worldwide,” used Tor to connect to a C2 server. The Central Office for Combating Crime Related to ... Read More »

Former Tor Director: Drug Markets Have Taken Over

A writer at CyberScoop, last month, spoke with the former director of The Onion Project, Andrew Lewman. Lewman left the Tor project two years ago and now works at OWL Cybersecurity. He advises military and intelligence agencies in the United States, including the NSA and DHS. As Patrick Howell O’Neill wrote, “his meetings with governments have gone from educating officials ... Read More »

Ukrainian Official Says Blocking Tor is Unrealistic

Andrew Kikhtenko, a Department Head for a drug combating unit of the Ukrainian National Police, explained that blocking Tor use was out of the picture. Mind you, Ukraine is currently in the process of implementing internet restrictions that prevent citizens from viewing specific Russian websites. The country is not alone in sanctions against Russia. The country’s law enforcement, though, is ... Read More »

Ukrainian Official Says Blocking Tor is Unrealistic

Andrew Kikhtenko, a Department Head for a drug combating unit of the Ukrainian National Police, explained that blocking Tor use was out of the picture. Mind you, Ukraine is currently in the process of implementing internet restrictions that prevent citizens from viewing specific Russian websites. The country is not alone in sanctions against Russia. The country’s law enforcement, though, is ... Read More »

Three More Reasons to Keep JavaScript off in Tor

Dr. Neal Krawetz, self-proclaimed security specialist and forensic researcher, took to his personal blog to publicize three low-level vulnerabilities in the Tor browser bundle. Upon first read of that sentence, one might wonder why Dr. Krawetz used his personal blog instead of the proper channels. That, it seemed, was a majorly frustrating element for the researcher: that “official” channels rarely ... Read More »

New OSX Malware Uses Tor and a MITM Proxy

Years ago, many believed Apple’s OSX was immune to viruses or malware. However in 2014 and 2015, this notion changed even though Mac specific infections existed since the early 2000s. But between 2014 and 2015, reported infections more than doubled. But because of timely security updates, among other factors, MacOS or OSX still remained more secure than some alternative operating ... Read More »

CiantiMF – An Android OS Security Framework For Protection Against Tor Botnet Malware

The number of individuals using online payment systems via mobile devices is increasing steadily, which attracts hackers who utilize sophisticated pieces of malware to increase the impact of their malicious attacks. By far, the android OS is the most popular mobile device OS in the whole world. Accordingly, security of android devices is increasingly becoming a hot topic. The Security ... Read More »

Deadmann : A New Dead Man Switch’s Network That Utilizes The Tor Network

Deadmann is a newly proposed anonymous network protocol which is comprised of multiple dead man’s switches that can share data even when a user across the network becomes incapacitated. Previously proposed models of dead man’s switches failed at achieving the following: Preserve users’ anonymity Enable users to efficiently manage their own data Encrypt users’ data in a manner that can ... Read More »

Russian Tor Exit Node Operator Arrested

On April Fools Day, Russian authorities began an investigation into posts made online calling for protests in Moscow on April 2nd. Later that week authorities arrested Dmitry Bogatov, a math teacher at the Moscow Law and Finance University, on suspicion that he violated section 3 of Article 212 of the Russian criminal code. Under that section of Article 212, Bogatov ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »