Home » Articles (page 20)

Articles

ChaosVPN: The Hackers’ VPN!

You have to admit it – even the name sounds intriguing, doesn’t it? ChaosVPN is a VPN intended to connect hackers and hackerspaces. The Chaos Computer Club, based in Hamburg, Germany, designed it. I discovered ChaosVPN in a very unusual way. I’m a member of several dark web-related social networks (on the clearnet, that is) and one of the group ... Read More »

Steganography: Hiding Data in Images

Steganography is the art and science of hiding messages, files etc. In a way that no one, except recipient, suspects that it even exists. Jump to the end to learn how to hide text or any file (even executable) in picture using Linux and Windows command line. Steganography has long and interesting history, I’m just going to share 2 old ... Read More »

The Growing Use of Blockchain Technology Outside Bitcoin

Over the past few years it has become relatively apparent that bitcoin is not going away. Though rumors of its death are always greatly exaggerated, for a few years it seemed there was a real chance the whole idea may never catch on. The unshakeable association with illicit activities, wallet thefts, exchange heists and other bad press made bitcoin extremely ... Read More »

All You Need To Know About Passwords

Choosing and managing passwords is the fundamental security measure in client’s control. Even if the application and it’s server is impenetrable, it means absolutely nothing if your password can be cracked by an average Joe. You would think that all security conscious people would know how to protect themselves, but I frequently see cases like this: CaliConnect’s Private PGP Key ... Read More »

coinmixer11.png

How to use a Bitcoin Mixer: Coinmixer

Click here to see part 3: BitBlender Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, but they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »

Analysis: Record DDoS Attacks by Mirai – IoT Botnet

Number of Internet of Things (IoT) devices is growing exponentially over time. Internet connected cameras, thermostats, refrigerators and others were recently part of biggest Distributed Denial of Service Attack (DDoS) in the history. This article contains explanation of botnets, DDoS and analysis of recent record breaking DDoS attack by Mirai Botnet and brief analysis of the C++ source code! DDoS ... Read More »

Battle of the Secure Smartphones

Dark web users just love having their smartphone communications spied on, right? (Detect any sarcasm there?) While no internet-connected device is 100% secure, some definitely are more armored than others.  In the smartphone arena, several phones consistently rank among the best. To which ones might I be referring? The Kali Linux NetHunter 3.0, Copperhead OS, and Blackphone 2 are a ... Read More »

How to use a Bitcoin Mixer: BitBlender

Click here to see part 2: BitCloak Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, but they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »

Browser Fingerprinting: Does Your Browser Stand Out?

Those of us who use Tor are probably already concerned about privacy. So, in that sense, are you aware of your browser fingerprint? For those unfamiliar with the term, browser fingerprinting is a method of tracking web browsers by the configuration and settings data that they make available to websites. This type of tracking reveals a considerable amount of information ... Read More »

Guest Post: VPN Tor vs Proxy Tor

Disclaimer: This is a guest post provided by privatoria.net – VPN service provider. The Internet today is huge. It offers many opportunities but also brings certain dangers. That is why need decent protection when we browse the web. The topic is quite popular and there are many options you can try. You can find much information about VPN, Proxy, TOR ... Read More »

The Art of Con

Con is actually short for confidence, but it’s most commonly used in confidence tricks context. The word con got so closely tied with confidence because it’s the basic principle of every fraud that exploits humans. If you can persuade someone, make him truly believe into something false, then you can probably get money out of it. Unlike most kinds of ... Read More »

How to use a Bitcoin Mixer: BitCloak

Click here to see part 1: Helix Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, bute they should be used carefully. We want to show you how to use, not only Bitcoin mixer, but four. We want to ... Read More »

Tor’s Biggest Threat – Correlation Attack

Throughout the years of Tor existence many users lost their anonymity. I’m going to explain a technique called “Correlation Attack” that government agencies used in the past for that purpose. These include exploiting human errors as well as highly sophisticated mathematical methods exploiting software flaws. This attack has been around since Tor widespread usage began and it seems like it ... Read More »

How to use a Bitcoin Mixer: Helix

Bitcoin mixers are quite popular and they will probably continue to be so even as new privacy solutions like Monero or Zcash come along. Coin tumblers provide a great service, bute they should be used carefully. Today, we want to show you how to use, not only Bitcoin mixer, but four. We want to show you how to use four ... Read More »

Introduction to Freenet: A Censorship-Resistant Network

I don’t know about you, but I’m not a fan of censorship; I would think that most privacy-minded Tor users would agree. If you’re part of this crowd, have you used Freenet yet? Though it functions quite a bit differently than Tor and I2P, it still has its advantages in terms of pseudonymity. A Brief Explanation Credit: freesocial.draketo.de Freenet enables ... Read More »