Keyword: tor

Brevity: Headers | « Text »
  • Video: Russian Navy Tests Tor-M2KM air defense missile system from Admiral Grigorovich Frigate

    03/30/2017 7:28:32 PM PDT · by sukhoi-30mki · 2 replies
    Navy Recognition ^ | 30 March 2017
    State-owned Russian-language news channel "Russia 24" published an interesting video showing at-sea test of a Russian Army Tor-M2KM air defense missile system from the Project 11356 frigate Admiral Grigorovich. The 9K331MKM module can be seen fitted on the helicopter pad of the frigate. Video: Russian Navy Tests Tor-M2KM air defense missile system from Admiral Grigorovich FrigateLaunch of a 9M331M surface to air missile from the self-contained combat module 9K331MKM short-range missile system Tor-M2KM, placed on the helicopter deck of the head frigate Admiral Grigorovich of Project 11356. Screenshot from "Russia 24" video (via bmpd.livejournal.com). The tests were conducted in the...
  • Browse free or die? New Hampshire library is at privacy fore[Tor]

    08/21/2016 7:58:03 PM PDT · by Theoria · 11 replies
    AP ^ | 26 June 2016 | Lynne Tuohy
    A small library in New Hampshire sits at the forefront of global efforts to promote privacy and fight government surveillance — to the consternation of law enforcement. The Kilton Public Library in Lebanon, a city of 13,000, last year became the nation's first library to use Tor, software that masks the location and identity of internet users, in a pilot project initiated by the Cambridge, Massachusetts-based Library Freedom Project. Users the world over can — and do — have their searches randomly routed through the library. Computers that have Tor loaded on them bounce internet searches through a random pathway,...
  • Mac malware gives attackers backdoor into OS X

    07/07/2016 10:11:59 PM PDT · by Utilizer · 11 replies
    iTnews (AUS) ^ | Jul 7 2016 3:36PM (AUS) | Staff Writer
    A newly discovered malware capable of cyber espionage and remote takeover is targeting Apple Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network. Named Eleanor (or Backdoor.MAC.Eleanor), the malware arrives disguised as a drag-and-drop file conversion application called the EasyDoc Converter. The application is found on many credible third-party sites, according to an analysis from Bitdefender, whose security researchers uncovered the malware. The program is neither verified nor digitally signed by Apple. In reality, the program's true purpose is far more malevolent, granting attackers a backdoor connection that...
  • Pressure mounts against Rule 41 – the FBI's power to hack Tor, VPN users on sight (Privacy Alert)

    06/22/2016 10:24:06 AM PDT · by dayglored · 20 replies
    The Register ^ | Jun 21, 2016 | Iain Thomson
    The campaign against Rule 41 – which will give cops and Feds in America the power to hack people's computers around the world – has kicked up a gear. Leaders of the US House of Representatives and Senate got a letter today urging them to block the rule change before it becomes permanent in December. The proposed legislative tweak, quietly passed by an obscure committee and approved by the Supreme Court in April, would allow a US magistrate judge to grant law enforcement access to any stored data on a computer, phone, or any storage device around the world that...
  • [October 21, 2015] Foundation of 'dark Web' steps into the light

    05/28/2016 5:32:14 PM PDT · by Cats Pajamas · 11 replies
    Politico ^ | 10/21/15 04:52 PM EDT | David Perera
    The Tor Project, the foundation of the crime-infiltrated "dark Web," is trying to soften its public image — but without backing away from the anonymous Web-surfing technology that has made it so controversial with law enforcement and intelligence agencies. For about a decade, the Massachusetts-based nonprofit has provided free software that lets activists and political dissidents visit websites and exchange messages outside the scrutiny of oppressive governments. But the same software HAS ALLOWED HIDDEN MARKETS FOR CHILD PORNOGRAPHY, GUNS, ILLEGAL DRUGS AND STOLEN CREDIT CARD INFORMATION TO FLOURISH, while heightening U.S. intelligence agencies' worries about technology providing an unbreakable wall...
  • How Ugandans Overturned An Election Day Social Media Blackout

    02/25/2016 7:20:06 PM PST · by Utilizer · 15 replies
    Motherboard online site ^ | February 24, 2016 // 07:00 AM EST | Written by G.S. Phillips and Grace Atuhaire
    When Ugandans went to the polls last Thursday in presidential and parliamentary elections, they participated in the most heavily-contested political battle since multiparty democracy began in 2005. But they also discovered that their access to social media and mobile payment services had been cut off, part of a three-day ban by the government that limited political discussion and temporarily halted financial transactions across the country. When the dust had cleared, incumbent, 30-year president Gen. Y.K. Museveni had been re-elected for another five-year term along with his National Resistance Movement (NRM) party, the leader of the largest opposition party was under...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 56 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Leaked NSA Documents Reveal How To Hide From The NSA

    01/01/2015 12:14:53 PM PST · by Libloather · 33 replies
    Huffington Post via MSN ^ | 1/01/15 | Damon Beres
    If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP. These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel. The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems "catastrophic" -- meaning the organization has "near-total loss/lack of insight to target communications," according to Der Spiegel. "Although the documents are around two years old,...
  • The Trouble with Tor

    12/17/2014 3:45:46 AM PST · by ShadowAce · 7 replies
    eSecurity Planet ^ | 16 December 2014 | Paul Rubens
    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or data on the Internet, whistle-blowers and dissidents who want to communicate with journalists, and anyone who wants to use the Internet without being tracked or to publish information on the Net without compromising their privacy.How Tor Works Tor works by sending traffic from its source...
  • FBI Arrests SpaceX Employee, Alleging He Ran The 'Deep Web' Drug Marketplace Silk Road 2.0

    11/06/2014 10:30:03 AM PST · by blam · 21 replies
    BI ^ | 11-6-2014 | James Cook
    James Cook November 6, 2014 The FBI and Europol have conducted a joint operation to take down the internet's thriving "deep web" drug marketplaces. The official FBI New York Twitter account just confirmed the seizure of Silk Road 2.0, saying that the site's alleged operator, Blake Benthall, was arrested in San Francisco on Wednesday. He now potentially faces life in prison, the FBI says. Benthall appears to be an employee of SpaceX, Elon Musk's private rocket company. (snip)
  • Researcher Finds Tor Exit Node Adding Malware to Binaries

    10/24/2014 6:54:44 PM PDT · by Utilizer · 22 replies
    The Kaspersky Lab Security News Service ^ | October 24, 2014 , 12:07 pm | Dennis Fisher
    A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan Security Group ran across the misbehaving Tor exit node while performing some research on download servers that might be patching binaries during download through a man-in-the middle attack. Downloading any kind of file from the Internet is a dodgy proposition these days, and many...
  • Here’s one way to land on the NSA watch list

    07/10/2014 6:41:50 AM PDT · by ShadowAce · 31 replies
    Wonky News Nerd ^ | 10 July 2014 | Julia Angwin and Mike Tigas
    Last week, German journalists revealed that the National Security Agency has a program to collect information about people who use privacy-protecting services, including popular anonymizing software called Tor. But it’s not clear how many users have been affected. So we did a little sleuthing, and found that the NSA’s targeting list corresponds with the list of directory servers used by Tor between December 2010 and February 2012 – including two servers at the Massachusetts Institute of Technology. Tor users connect to the directory servers when they first launch the Tor service.That means that if you downloaded Tor during 2011, the NSA may have scooped up your...
  • Browser Change From Firefox?

    05/30/2014 11:24:40 AM PDT · by UScbass · 65 replies
    USCBass
    Have been using the Firefox browser since it was introduced; with all the controversies (political), it has been suggested that I change to Chrome (Google), Safari (Apple), or Opera browser. Any suggestions as to whether a change is recommended and, if so, to what?
  • Going Dark: The Internet Behind The Internet

    05/26/2014 12:49:19 PM PDT · by Mean Daddy · 28 replies
    NPR ^ | May 25, 2014
    The average computer user with an Internet connection has access to an amazing wealth of information. But there's also an entire world that's invisible to your standard Web browser. These parts of the Internet are known as the Deep Web. The tools to get to there are just a few clicks away, and more and more people who want to browse the Web anonymously are signing on. Fans of the series House of Cards might recall the Deep Web being worked into the plot of latest season. The character Lucas, a newspaper editor who was trying find a hacker, gets...
  • Russia keen to sell anti-missile defence system to India

    02/18/2014 9:15:01 PM PST · by sukhoi-30mki · 4 replies
    The Hindu BusinessLine ^ | February 12, 2014 | Amrita Nair-Ghaswalla
    Hard-sells fully operational combat model at Defexpo Mumbai, February 12: Even as the Indian Army has entered the global market to buy short-range surface-to-air missile defence systems, Russia is keen to offer its anti-missile system Tor-M2KM to India, with the latter slated to undergo a series of tests. Exhibited outside of Russia for the first time, a fully operational combat model of the Tor-M2KM anti missile system was displayed at the Defexpo-2014 exhibition held in Delhi recently. Defence purchases have risen from just over $200 million in 2001 to over $14 billion currently. As part of the recently announced tender...
  • Russia to Arm Warships with New Air Defense System

    02/09/2014 6:31:33 AM PST · by sukhoi-30mki · 3 replies
    Ria Novosti ^ | 06/02/2014
    NEW DELHI, February 6 (RIA Novosti) – A naval version of the Tor short-range air defense system will be installed on all Russian warships, the manufacturer, Almaz-Antey Concern, said Thursday. The new system, dubbed M-Tor, is a variant of the modernized Tor-M2KM system featuring modular assembly, high reliability and improved precision, according to Yuri Baykov, spokesman for Almaz-Antey. M-Tor will gradually replace the outdated Kinzhal (SA-N-Gauntlet) systems, which have been in service since 1989, Baykov said at the DEFEXPO INDIA-2014 exhibition in New Delhi. He also said Russia will offer Tor-M2KMs to India as part of the recently announced tender...
  • Group Thinks Anonymity Should Be Baked Into the Internet Itself

    11/27/2013 9:12:38 AM PST · by Bobalu · 36 replies
    MIT Technology Review ^ | November 26, 2013 | David Talbot
    The Internet’s main engineers have asked the architects of Tor—networking software designed to make Web browsing private—to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps. This would, in turn, allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. If the discussions bear fruit, it could lead to the second major initiative of the Internet Engineering Task Force (IETF) in response to the mass surveillance by...
  • Attacking Tor: how the NSA targets users' online anonymity

    10/04/2013 11:47:48 AM PDT · by shego · 10 replies
    The Guardian ^ | 10/4/13 | Bruce Schneier
    The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world. According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The...
  • FBI seizes ‘Silk Road' black market domain, arrests owner

    10/02/2013 9:18:08 AM PDT · by Pan_Yan · 48 replies
    Russia Today ^ | October 02, 2013 15:48
    Authorities have arrested a man in San Francisco, California accused of operating an underground website that allowed users to purchase guns and drugs from around the world using encrypted, digital currency. Ross William Ulbricht, also known as “Dread Pirate Roberts,” was arrested by the Federal Bureau of Investigation on Tuesday for his alleged involvement in the Silk Road online marketplace, according to court papers published this week. A sealed complaint dated September 27 was unearthed by security researcher Brian Krebs in which Ulbricht is accused of narcotics trafficking conspiracy, computer hacking conspiracy money laundering conspiracy and more. According to prosecutors,...
  • FBI Controlled Freedom Hosting Tor Servers, Agency Admits

    09/16/2013 10:10:45 AM PDT · by Eagle of Liberty · 3 replies
    News.Softpedia.com ^ | 09/14/2013 | Eduard Kovacs
    As highlighted by Wired, this doesn’t really surprise anyone. Researchers almost immediately noted that the Tor malware, which leveraged a vulnerability in Firefox, had to be operated by a law enforcement agency. That’s because the threat didn’t cause too much damage, despite the fact that it had the potential. Instead, it simply collected MAC addresses and Windows hostnames, sending the data back to a server in Northern Virginia. Back in August, Irish authorities arrested 28-year-old Eric Eoin Marques, the man believed to have operated Freedom Hosting, one of the largest Tor hidden services hosting providers. Marques is accused of facilitating...