Time flies like an arrow - Fruit flies like a banana


InvizBox 2

InvizBox, a small Irish company focused on building Wi-Fi routers with built-in Internet privacy, has successfully crowdfunded the next generation of its eponymous privacy platform. The InvizBox 2 and InvizBox 2 Pro are more than an evolution from the team’s original product, which was an open source modification of the OpenWRT router code focused on […]

VPN over Tor versus Tor over VPN

A VPN allows a user to encrypt all the internet traffic traveling to and from his or her device and route it through a server in a location of that user’s choosing. A VPN in combination with Tor further adds to the security and anonymity of the user. While somewhat similar, Tor emphasizes anonymity, and […]

Spies Hack. But the Best Spies Hack Other Spies.

When cyber spies known as NetTraveler were busy snooping on hundreds of government and military victims in 40 countries a few years ago, little did they know that another hacking group was probably watching them. During their investigation of NetTraveler, Kaspersky Lab researchers discovered an unusual backdoor that could have helped another attacker access one […]

Shared vs. Dedicated VPN IP Address

In comparing VPN providers, you may have come across the terms Shared or Dedicated IP address. This article will show teach you: the differences between the the advantages/disadvantages of each and which VPN services offer Shared vs. Dedicated IPs. By and large, most VPN services offer primarily Shared (Dynamic) IP addresses, which tend to offer greater privacy/anonymity with some […]

How Facebook Outs Users

Leila is a sex worker. She goes to great lengths to keep separate identities for ordinary life and for sex work. Her “real identity” — the public one, who lives in California, uses an academic email address, and posts about radical politics — joined Facebook in 2011. Her sex-work identity is not on the social network […]

Privacy implications of email tracking

We show that the simple act of viewing emails contains privacy pitfalls for the unwary. We assembled a corpus of commercial mailing-list emails, and find a network of hundreds of third parties that track email recipients via methods such as embedded pixels. About 30% of emails leak the recipient’s email address to one or more […]

Who Is Marcus Hutchins?

In early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in the security community until May 2017 when the U.K. media revealed him as the “accidental […]

Browser Security White Paper

This white paper [PDF] provides a technical comparison of the security features and attack surface of Google Chrome, Microsoft Edge, and Internet Explorer. We aim to identify which browser provides the highest level of security in common enterprise usage scenarios, and show how differences in design and implementation of various security technologies in modern web […]

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme