There’s a lot of excitement about Bitcoin and crypto currencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We […]
Over the past few years you’ve seen the Tor Project’s name pop up in the news on more than one occasion. With a core mission of “advancing human rights and freedoms by developing free and open anonymity and privacy technologies,” it’s easy to understand why in this day and age. One of those technologies is […]
People think that a VPN keeps them anonymous while online. People are more often than not wrong. What a VPN, any VPN, can actually offer is a method of securing your connectivity and making it much harder for an attacker (be that a hacker or the government) from intercepting your data whilst in transit.
Encryption keeps some of your most vital data safe. It protects your credit card information from being stolen by anyone eavesdropping on your Internet traffic when you make purchases online. It’s also used to keep medical information secure, protect free speech, and defend against surveillance. Increasingly, encryption is becoming widely available by default on consumer […]
At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations. When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers […]
You’ve probably read the news articles. If you haven’t, please see the following: https://cyngn.com/blog/cyanogen-services-shutting-down So, yes, this is us. LineageOS will be a continuation of what CyanogenMod was. This is the definition of open. A company pulling their support out of an open source project does not mean it has to die.
Due to the uptick of illegal activities being conducted with the help of anonymity via the dark web, law enforcement agencies all over the world have turned their attention and revamped their efforts in dealing with cybercrime. However, the ability of law enforcement agencies to effectively combat internet crime is affected by the widespread adoption […]
Privacy advocates, who make up the largest portion of Tor users, will be ecstatic about a recent initiative from the CryptoWorld Foundation. According to a recent interview, the new platform is a Tor-as-a-Service portal called TorWorld. The main goal of this Tor initiative is to essentially create a public forum where internet users can set […]
What was, at one time, a shopping mall for all things illegal, is now becoming a minefield that many people are afraid to enter. A 45-year-old German man whose identity has not yet been made public was arrested after two detectives from a Customs Investigations Office in Essen pinned a dark web shipment of ammunition […]
If you’re using a VPN app to secure your smartphone — maybe to download torrents, maybe to make your online banking a little more safe — then chances are, it’s not doing what it pretends to. A paper co-authored by CSIRO’s data science arm examined nearly 300 Android VPN apps and found that almost all […]
An investigation by threat intelligence specialists Digital Shadows has uncovered the existence of a “Rat-as-a-Service” site called Ripper.cc Anyone who has ever spent any time trawling the Dark Web will appreciate what a den of inequity it is. Cyber-criminals use forums as marketplaces to trade in everything from stolen credit cards to exploit kits that […]
The main goal of the Crypto Museum is to preserve history. This is done by collecting, restoring and describing historical cipher machines, spy radio sets, intercept receivers and and other spy-related stuff. Some of the items described on this website are part of the collection of the Crypto Museum, but others have only crossed our […]
Almost every modern business and application uses open-source modules. It’s misleading to spend time distinguishing between open-source and proprietary software, because modern applications include third-party software components. Many of those components are open source, and very few companies have a solid understanding of the security vulnerabilities that come with the code.
There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution. OnionShare is a free P2P file sharing service created by technologist Micah Lee that operates without middlemen. OnionShare boasts of the […]