When Ross Compton’s Ohio home caught fire last September, the story he told police was that he grabbed a few things and rushed out of the house, hurling essentials out a bedroom window he broke open with his cane before scrambling out himself. Police, though, were suspicious. Compton’s few things had included a computer, a […]
As the Internet of Things (IoT) devices are growing at a great pace, they continue to widen the attack surface, giving attackers a large number of entry points to affect you in some way. The attackers can use your smart devices to gain backdoor entry to your network, giving them the capability to steal sensitive […]
HOW TO LEAK (AND NOT GET CAUGHT) A brief guide to becoming an anonymous source. Web The anonymity network Tor obscures your identity by routing your online traffic through computers worldwide. Access it via the web-based Tor Browser to visit any site related to your planned contact with the press. Find a directory of the […]
Recent events have brought into question the reliability and safety of the Tor network. Predominantly, the main issue is the repeated incidences of internet users using Tor to facilitate criminal activities and evade law enforcement agencies. Although Tor browser is still the go-to tool when looking for anonymity on the internet, there are other tools […]
Double VPN is a technology that hides online activity behind several servers inter connected via VPN-tunnel. A client is connected to one server which in turn redirects traffic to the second server, with that the traffic is subjected to several encoding steps. I saw a reminder of this in an “advertorial” published in the March 2017 […]
There’s a lot of excitement about Bitcoin and crypto currencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We […]
Over the past few years you’ve seen the Tor Project’s name pop up in the news on more than one occasion. With a core mission of “advancing human rights and freedoms by developing free and open anonymity and privacy technologies,” it’s easy to understand why in this day and age. One of those technologies is […]
People think that a VPN keeps them anonymous while online. People are more often than not wrong. What a VPN, any VPN, can actually offer is a method of securing your connectivity and making it much harder for an attacker (be that a hacker or the government) from intercepting your data whilst in transit.
Encryption keeps some of your most vital data safe. It protects your credit card information from being stolen by anyone eavesdropping on your Internet traffic when you make purchases online. It’s also used to keep medical information secure, protect free speech, and defend against surveillance. Increasingly, encryption is becoming widely available by default on consumer […]
At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations. When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers […]
You’ve probably read the news articles. If you haven’t, please see the following: https://cyngn.com/blog/cyanogen-services-shutting-down So, yes, this is us. LineageOS will be a continuation of what CyanogenMod was. This is the definition of open. A company pulling their support out of an open source project does not mean it has to die.
Due to the uptick of illegal activities being conducted with the help of anonymity via the dark web, law enforcement agencies all over the world have turned their attention and revamped their efforts in dealing with cybercrime. However, the ability of law enforcement agencies to effectively combat internet crime is affected by the widespread adoption […]