HOW TO LEAK (AND NOT GET CAUGHT) A brief guide to becoming an anonymous source. Web The anonymity network Tor obscures your identity by routing your online traffic through computers worldwide. Access it via the web-based Tor Browser to visit any site related to your planned contact with the press. Find a directory of the […]
Recent events have brought into question the reliability and safety of the Tor network. Predominantly, the main issue is the repeated incidences of internet users using Tor to facilitate criminal activities and evade law enforcement agencies. Although Tor browser is still the go-to tool when looking for anonymity on the internet, there are other tools […]
Double VPN is a technology that hides online activity behind several servers inter connected via VPN-tunnel. A client is connected to one server which in turn redirects traffic to the second server, with that the traffic is subjected to several encoding steps. I saw a reminder of this in an “advertorial” published in the March 2017 […]
The first edition of Cobbler (“Mono”) is now available. I wrote it as I did not feel comfortable with either cloud-based or local, browser integrated password managers. Cobbler looks just like a standard text editor, but it can store any type of sensitive information in a tiny fixed-size encrypted and authenticated container. Examples of sensitive […]
There’s a lot of excitement about Bitcoin and crypto currencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We […]
Over the past few years you’ve seen the Tor Project’s name pop up in the news on more than one occasion. With a core mission of “advancing human rights and freedoms by developing free and open anonymity and privacy technologies,” it’s easy to understand why in this day and age. One of those technologies is […]
When you protest for a cause, alongside thousands of people, it is very likely that the mobile network will stop working on everyone’s smartphone. This happens because there are too many smartphones in a small space and the mobile network can’t handle so many connections from the same place. When this happens, you can no […]
Even as the encryption app Signal became the go-to private communications channel for activists, journalists, politicians, and more, its encrypted calling feature remained less than perfect. It lacks video, often drops calls, and doesn’t always integrate with your phone’s existing features. A Signal update gradually rolling out now upgrades the calling features and adds video, […]
Microsoft pushed patches to devices running Windows 7 and 8.1 in recent time that collect information and transfer data to Microsoft regularly. One of the main issues that Windows users may have with telemetry is that Microsoft does not reveal what it is collecting, and what is included when telemetry data is transferred to the […]
People think that a VPN keeps them anonymous while online. People are more often than not wrong. What a VPN, any VPN, can actually offer is a method of securing your connectivity and making it much harder for an attacker (be that a hacker or the government) from intercepting your data whilst in transit.
Encryption keeps some of your most vital data safe. It protects your credit card information from being stolen by anyone eavesdropping on your Internet traffic when you make purchases online. It’s also used to keep medical information secure, protect free speech, and defend against surveillance. Increasingly, encryption is becoming widely available by default on consumer […]
At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations. When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers […]
You’ve probably read the news articles. If you haven’t, please see the following: https://cyngn.com/blog/cyanogen-services-shutting-down So, yes, this is us. LineageOS will be a continuation of what CyanogenMod was. This is the definition of open. A company pulling their support out of an open source project does not mean it has to die.