Darknet Tech
-
Bitcoin Wallet Wasabi Releases Update to Restore Service Amidst Attack on Tor
The new solution for this Bitcoin wallet uses Tor to anonymously route traffic to exit nodes rather than relying on Tor's backend while calling for people to raise money to support the Tor network. -
Kaspersky exposes “poisoned” Tor browser tracking Chinese users’ browsing history, physical location, please be wary of all shares from YouTube rogue channel “Tool Master i”
Kaspersky said that according to its tests, "OnionPoison" targets victims located in China because its C2 server checks whether the external IP address of the victim's machine is from China. Kaspersky reminded Chinese users to check whether the Tor browser they use is downloaded from the official one. -
Tor Project Releases New Version of Arti 1.0.0, Redeveloped in Rust Language to Make Tor More Secure
In 2020, Tor co-founder Nick Mathewson began work on a version of Rust Tor, then renamed Arti as the official version of Tor, which has gone through several beta releases and has now finally reached the milestone of 1.0.0. -
The three main ways dark web criminals attack corporate infrastructure
After analyzing nearly 200 posts on the Dark Web that provided initial access to corporate data, Kaspersky found that 75 percent of the posts provided initial access via Remote Desktop Protocol (RDP), each with different permissions ranging from domain administrator, local administrator and normal user permissions. -
Tox, the end-to-end encrypted chat protocol commonly used on the dark web, and an introduction to client software based on the Tox protocol
Tox is a free peer-to-peer instant messaging and video telephony network protocol that enables encrypted data exchange. The goal of the project is to create a secure and easy-to-use communication platform. the combination of Tox and Tor enables completely anonymous peer-to-peer communication under the dark web. -
Set up a Tor proxy on Windows to access the dark web using Chrome
This article introduces a simple way to access the dark web without using the Tor browser under Windows. Through this access, you can use the Tor node as a proxy to access the Tor network, and you can develop software to crawl the dark web and monitor the dark web. -
What exactly is the XMPP used extensively on the dark web?
XMPP is the Extensible Messaging and Presentation Protocol, a set of open technologies for instant messaging delivery, message presentation, multi-party chat, voice and video calls, collaboration, lightweight middleware, content federation and common routing of XML data. the XMPP protocol is still popular among users worldwide, especially in the dark web, where people are keen to use XMPP for contact. -
Researchers Share Techniques for Discovering Anonymous Ransomware Sites on the Dark Web
By leveraging the operational security failures of threat actors and other techniques, Cisco Talos was able to identify TOR hidden services hosted on public IP addresses, some of which were previously unknown infrastructures associated with DarkAngels, Snatch, Quantum and Nokoyawa ransomware groups. -
Use OnionShare to securely and anonymously share files over the dark web
When file sharing is turned on, OnionShare creates an onion address that others can access in the Tor browser and access the files you want to share. In addition to allowing you to share files securely and anonymously, OnionShare also allows you to host websites and chat anonymously with friends using the Tor network. -
The CIA’s dark web site could pose a risk to potential leakers, a hacker questioned
"ODN" believes that Nathan Fain's analysis is still valid, and that the most secure way for the CIA to do this is to set up a securedrop submission site on the dark web and configure that site with an SSL certificate based on the onion domain.
I have read so many posts about the blogger lovers howe...
Commented on Who commits crime on Tor? A new analysis has a surprising answer