Home » Articles (page 20)

Articles

A Noob’s Guide to I2P-Bote

As darknets go, some people may think of I2P as one of the more technically-oriented ones. For that reason, I think it deserves more tutorials! If you’ve already read our 2013 article Full Guide: How to Access I2P Sites & Use themarketplace.i2p, then you at least have some idea how to access I2P. Therefore, I thought I2P-Bote, a messaging platform ... Read More »

Interview: Deku_shrub, Author of Pirate dot London

With all the misinformation, rumors, and flat-out lies that pass around the internet with regard to the deep web and dark web, it’s refreshing to talk to someone who actually knows their stuff. I had such an opportunity recently; I interviewed Deku_shrub, author of the blog Pirate dot London. In his words, it’s “a blog about the dark web & ... Read More »

HANGING OFF THE MOLECULE: A BRIEF MEETING WITH ALEXANDER SHULGIN

I met Alexander Shulgin after a lecture he gave at the Mindstates conference in Berkeley, in November of 1997. He was seated unobtrusively on a stoop in front of the Berkeley lecture hall, The International House, minding his own business, a burly avuncular old man, no doubt unwinding after the lecture he gave to a packed audience on mescaline-containing cacti, ... Read More »

ChaosVPN: The Hackers’ VPN!

You have to admit it – even the name sounds intriguing, doesn’t it? ChaosVPN is a VPN intended to connect hackers and hackerspaces. The Chaos Computer Club, based in Hamburg, Germany, designed it. I discovered ChaosVPN in a very unusual way. I’m a member of several dark web-related social networks (on the clearnet, that is) and one of the group ... Read More »

Steganography: Hiding Data in Images

Steganography is the art and science of hiding messages, files etc. In a way that no one, except recipient, suspects that it even exists. Jump to the end to learn how to hide text or any file (even executable) in picture using Linux and Windows command line. Steganography has long and interesting history, I’m just going to share 2 old ... Read More »

The Growing Use of Blockchain Technology Outside Bitcoin

Over the past few years it has become relatively apparent that bitcoin is not going away. Though rumors of its death are always greatly exaggerated, for a few years it seemed there was a real chance the whole idea may never catch on. The unshakeable association with illicit activities, wallet thefts, exchange heists and other bad press made bitcoin extremely ... Read More »

All You Need To Know About Passwords

Choosing and managing passwords is the fundamental security measure in client’s control. Even if the application and it’s server is impenetrable, it means absolutely nothing if your password can be cracked by an average Joe. You would think that all security conscious people would know how to protect themselves, but I frequently see cases like this: CaliConnect’s Private PGP Key ... Read More »

coinmixer11.png

How to use a Bitcoin Mixer: Coinmixer

Click here to see part 3: BitBlender Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, but they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »

Analysis: Record DDoS Attacks by Mirai – IoT Botnet

Number of Internet of Things (IoT) devices is growing exponentially over time. Internet connected cameras, thermostats, refrigerators and others were recently part of biggest Distributed Denial of Service Attack (DDoS) in the history. This article contains explanation of botnets, DDoS and analysis of recent record breaking DDoS attack by Mirai Botnet and brief analysis of the C++ source code! DDoS ... Read More »

Battle of the Secure Smartphones

Dark web users just love having their smartphone communications spied on, right? (Detect any sarcasm there?) While no internet-connected device is 100% secure, some definitely are more armored than others.  In the smartphone arena, several phones consistently rank among the best. To which ones might I be referring? The Kali Linux NetHunter 3.0, Copperhead OS, and Blackphone 2 are a ... Read More »

How to use a Bitcoin Mixer: BitBlender

Click here to see part 2: BitCloak Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, but they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »

Browser Fingerprinting: Does Your Browser Stand Out?

Those of us who use Tor are probably already concerned about privacy. So, in that sense, are you aware of your browser fingerprint? For those unfamiliar with the term, browser fingerprinting is a method of tracking web browsers by the configuration and settings data that they make available to websites. This type of tracking reveals a considerable amount of information ... Read More »

Guest Post: VPN Tor vs Proxy Tor

Disclaimer: This is a guest post provided by privatoria.net – VPN service provider. The Internet today is huge. It offers many opportunities but also brings certain dangers. That is why need decent protection when we browse the web. The topic is quite popular and there are many options you can try. You can find much information about VPN, Proxy, TOR ... Read More »

The Art of Con

Con is actually short for confidence, but it’s most commonly used in confidence tricks context. The word con got so closely tied with confidence because it’s the basic principle of every fraud that exploits humans. If you can persuade someone, make him truly believe into something false, then you can probably get money out of it. Unlike most kinds of ... Read More »

How to use a Bitcoin Mixer: BitCloak

Click here to see part 1: Helix Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, bute they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »