Home » Author Archives: Kiell

Author Archives: Kiell

Research and News in Tor, Privacy, and Security – Dec 28th, 2014

This article is part of a weekly series covering developments in Tor and the privacy-related tech world Thomas White, aka TheCthulhu, has been releasing updates on the recent compromise of his servers. Last week, he reported that he unexpectedly lost control of several servers, which included multiple exit relays and several hidden services. At this time, he has regained access ... Read More »

Research & News in Tor, Privacy, & Security – Dec 21th, 2014

Research and News in Tor, Privacy, and Security – December 21, 2014 This article is part of a weekly series covering developments in Tor and the privacy-related tech world TheCthulhu announced that his mirrors of Globe and Atlas, two popular Tor network index tools, are now available as hidden services. The Globe mirror’s hidden service is available here, and the ... Read More »

Research & News in Tor, Privacy, & Security – Dec 15th, 2014

Tor Browser 4.0.2 has been released. The new release fixes compiler bugs in Windows, ensures that cache entires are isolated by domain, and prevents user locale settings from being leaked by the Javascript engine. Tor Browser 4.5-alpha-2 is now out. This version includes improvements to Torbutton’s circuit visualization feature, and removes a custom fix to the POODLE vulnerability, implementing Mozilla’s ... Read More »

A Carder’s First Experience

We do not support carding! This is for educational purposes only – and reflect the author’s own experience and views only. At the time of this story, I was new to carding. Saying that I was “new” is a bit of an understatement. I had never used any Darknet markets, and I had barely any experience with Bitcoin. I had ... Read More »

Research & News in Tor, Privacy, & Security – Nov 30th, 2014

Research Wei Yu et al. published a research paper titled “On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback”. The paper analyzes efficient techniques for tracing the origin of “cyber crimes through anonymous communication networks.” The paper outlines techniques for performing traffic confirmation attacks through the use of Frequency Hopping Direct Sequence Spread Spectrum (FHSS), Code Hopping-DSSS (CH-DSSS), ... Read More »

Secure Data Wiping on GNU/Linux

In this article, I’m going to be outlining how to securely erase data on a device while running a GNU/Linux-based operating system. This process can be used to wipe a device, such as a USB drive, while running your normal GNU/Linux operating system; or it can be used to wipe your hard drive from a GNU/Linux live CD/USB. There are ... Read More »

Research & News in Tor, Privacy, & Security – Nov 24th, 2014

Tor Browser 4.5-alpha-1 has been released, which marks the first release of the 4.5 Tor Browser series. It includes a “security slider”, which is designed to allow a user to easily edit security preferences. The security slider has four security settings: low (default), medium-low, medium-high, and high. The new “status reporting UI” allows a user to quickly see the Tor ... Read More »

Research & News in Tor, Privacy, & Security – Nov 16th, 2014

A research paper suggesting that over 81% of Tor users could be deanonymized through a traffic correlation attack was published by Sambuddho Chakravarty et al. The paper outlines how the “NetFlow” technology in Cisco routers, and similar technology included in most routers, can make users susceptible to traffic analysis. Cisco’s NetFlow technology is used to log certain information about the ... Read More »

Research & News in Tor, Privacy, & Security – Nov 11th, 2014

Tor Research The Open Observatory of Network Interference (OONI) is currently studying reachability of bridges in countries that impose censorship. They are also studying how effective these countries are at preventing the use of pluggable transports. They are performing several tests. First is a Bridge reachability measurement, which attempts to build a Tor circuit to the bridge being tested. Next ... Read More »

Research and News in Tor, Privacy, and Security – October 26th, 2014

Tor Recent Research Alex Biryukov and Ivan Pustogarov at the University of Luxembourg published a research paper titled, “Bitcoin over Tor isn’t a good idea.” The paper discusses possible security risks when using Bitcoin through Tor, and how these risks could possibly be countered. Bitcoin’s reputation system, designed to heighten security, includes protection against DoS attacks. If an attacker were ... Read More »

Weekly Tor and Security News – October 21, 2014

Tor News Earlier this week, the Anonabox raised over $500,000 after launching a campaign on Kickstarter. The anonabox, created by August Germar, is a device designed to route all of a network’s traffic through the Tor network. It runs alongside an existing modem or router, and claims to be fully Open Source. However, after controversy surrounding the project generated quite ... Read More »