Blog Posts Tagged with "Anonymity"

03b2ceb73723f8b53cd533e4fba898ee

Traveling the Silk Road: A Study of the Online Black Market

August 10, 2012 Added by:Pierluigi Paganini

I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Chimps With Guns and the Bloggers Who Give Them Ammo

August 02, 2012 Added by:Infosec Island Admin

One must know the technology and the problems with it before using it cognizantly. This unfortunately is not the case in what is being advocated by Quinn Norton on Wired with regard to Cryptocat. Specifically where she makes declamations about overthrowing governments with things like untested crypto schemes...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Between You and Me, This is Not Private...

July 22, 2012 Added by:Fergal Glynn

If most websites can’t get password storage right, you can bet they can’t get storage of the content you are trusting them with right either. The private documents that you stored with your favorite cloud service are probably not encrypted in a way that only your account can decrypt, if they’re encrypted at all...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Exploring Hacktivism and the Deep Web

July 03, 2012 Added by:Pierluigi Paganini

When we think of hacktivism, immediately we connect it to anonymity. In fact, those who wish to express their dissent through hacktivism most often prefer the use of anonymity. It's clear that the ultimate context in which these people can freely exchange ideas and information is through the Deep Web...

Comments  (2)

48062676f7b2fc521b0b32a3c6494469

Anonymity and E-Commerce in the Black Market with Tor

July 02, 2012 Added by:gaToMaLo r. amores

A skilled attacker may be able to determine you are using a VPN to connect to Tor by fingerprinting traffic streams. Tor traffic is padded to 512 byte size packets, normal VPN traffic is not. By filtering for 512 byte streams, an attacker can determine who all is using Tor in a given area...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Staff to Present at Hackers on Planet Earth

July 01, 2012 Added by:Electronic Frontier Foundation

Technologies are transforming our society, and when our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. Hackers On Planet Earth (HOPE), one of the most creative and diverse hacker events in the world...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Cyber Crime: Government vs. Bitcoin Anonymity

June 28, 2012 Added by:gaToMaLo r. amores

For anonymous transactions to be possible through Bitcoin, a mixing system must be used. There are two types: Those secure against attack from people viewing the public transaction like Bitcoin Laundry, and those secure against attack from the mixing system itself, like Open Transactions...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Pierluigi Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Underground Financial Networks

June 26, 2012 Added by:gaToMaLo r. amores

Greendot and other Reloadable debit cards are not a safe means of conducting anonymous financial transfer. The financial networks created by these cards are very prone to network analysis. There is an unacceptable amount of cross network contamination for vendors...

Comments  (4)

7ddc1f3000a13e4dfec28074e9e7b658

How to Activate 'Do Not Track' in Your Browsers

June 21, 2012 Added by:Electronic Frontier Foundation

Do Not Track combines both technology (a signal transmitted from a user) as well as a policy framework for how companies that receive the signal should respond. The following tutorial walks you through the enabling Do Not Track in the four most popular browsers: Safari, Internet Explorer 9, Firefox, and Chrome...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

What Are ToR Hidden Services?

June 15, 2012 Added by:gaToMaLo r. amores

In the ToR-.onion network, the client asks to use a website's services, then starts a handshake at a rendezvous point (onion relay) - not at the server/IP. They're never on the site/server when in OnionLand, can’t do a WhoIs and get an IP and cannot find a geo-location. If they can’t find you, they can't hack you...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

What is the Deep Web? A Trip into the Abyss...

May 25, 2012 Added by:Pierluigi Paganini

The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Frictionless Sharing Like Digital Privacy Cancer?

May 25, 2012 Added by:Rebecca Herold

In a nutshell, “frictionless sharing” basically is a passive service that allows apps to automatically share your activity to a very wide number of entities and locations as you visit different websites, view videos and photos, listen to music, read ads and articles, and so on...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Pierluigi Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

HTTPS and Tor: Working to Protect Your Security Online

March 09, 2012 Added by:Electronic Frontier Foundation

EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)

Page « < 1 - 2 > »