Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $25,627
31%  
Woo hoo!! And we're now over 31%!! Thank you all very much!! God bless.

Keyword: tor

Brevity: Headers | « Text »
  • Tor joins forces with VPN company to create new browser for increased privacy

    04/05/2023 6:35:25 AM PDT · by devane617 · 15 replies
    techxplore ^ | 04/05/2023
    Cookies. Fingerprinting. Tracking. Surveillance. Spyware. Geostalking. It's a rough neighborhood out there for denizens of the web. Whether you want to anonymously provide whistle-blowing details on a corrupt business operation or you just want to check today's weather, simply logging on is fraught with threats to your privacy. This week, two major players in the field of online privacy joined forces to release a super-private browser that they say will "make life harder for those who collect data from you." Mullvad VPN, a highly respected service based in Sweden, where providers are legally protected from being forced to collect traffic-related...
  • TOR Browser Won't Connect After Update -- Any Advice?

    12/09/2022 8:22:34 PM PST · by Angelino97 · 13 replies
    My TOR browser updated to 12.0. After that, it wouldn't connect to the internet. I push "Connect" and it says "Connecting..." but minutes pass and nothing.I tried changing my VPN's point of origin. I tried rebooting. But it doesn't help.I'm running Windows 7 64 bit Pro.
  • FBI: Florida man scouted terror targets and attack weapons (deported from Saudi Arabia to US)

    05/27/2020 3:52:49 PM PDT · by Libloather · 19 replies
    Washington Times ^ | 5/27/20 | Curt Anderson
    ST. PETERSBURG, Fla. (AP) - A Florida man is charged with providing material support to the Islamic State extremist group, including attempting to buy multiple weapons and scouting potential targets for an attack in the Tampa Bay area, federal prosecutors said Wednesday. A criminal complaint charges Muhammed Momtaz Al-Azhari, a 23-year-old U.S. citizen, with attempting to provide material support or resources to a designated foreign terrorist organization. The charge carries a potential 20-year prison term. **SNIP** According to the affidavit, Al-Azhari scouted a number of targets in the Tampa Bay region, including beaches, parks and even the Tampa FBI field...
  • Feds take down the world's 'largest dark web child porn marketplace'

    10/16/2019 3:46:00 PM PDT · by Perseverando · 37 replies
    NBC News ^ | October 16, 2019 | Cyrus Farivar and Andrew Blankstein
    The dark web, a section of the internet that can only be accessed via a Tor browser, is designed to protect users' tracks online and obscure digital footprints.Jeroen Jumelet / EPA-EFE WASHINGTON — Federal prosecutors have filed multiple charges against a 23-year-old South Korean man accused of running what they call the world's "largest dark web child porn marketplace." The now-shuttered English-language site, called "Welcome to Video," contained more than 200,000 unique videos or almost 8 terabytes of data showing sex acts involving children, toddlers and infants, according to the 18-page criminal indictment unsealed here Wednesday, and processed 7,300...
  • Millions of Phones Leaking Information Via Tor

    10/14/2019 6:25:36 AM PDT · by ShadowAce · 42 replies
    InfoSecurity ^ | 11 October 2019 | Sean Michael Kerner
    There is a privacy threat lurking on perhaps hundreds of millions of devices, that could enable potential attackers to track and profile users, by using information leaked via the Tor network, even if the users never intentionally installed Tor in the first place. In a session at the SecTor security conference in Toronto, Canada on October 10, researchers Adam Podgorski and Milind Bhargava from Deloitte Canada outlined and demonstrated previously undisclosed research into how they were able to determine that personally identifiable information (PII) is being leaked by millions of mobile users every day over Tor. The irony of the...
  • Browser and search engine team up to help you stay private on the internet

    03/25/2018 8:12:01 AM PDT · by Oldpuppymax · 35 replies
    The Coach's Team ^ | 3/25/18 | Jim Bray
    "Just because you're paranoid doesn't mean that they aren't out to get you." I don't know, or care, who said that originally, but in this age of hacking and cyber corruption – and the deep state trying desperately to defeat the forces of light - it's becoming increasingly clear that there appears to be folks out in cyberspace who don't have your best interests in mind. Indeed, you may have heard about how Facebook and Google have been revealed as corrupt data miners more interested in raking in cash and helping their fellow political travellers than in providing the benign...
  • (Vanity) Are Any Freepes Familiar With Orbot (TOR for Android)?

    02/19/2018 12:27:58 PM PST · by holymoly · 5 replies
    Orbot ^ | 02/19/2018 | Me
    I ask, because I recently noticed the DuckDuckGo mobile privacy browser integrates support for TOR/Orbot. (Under "Settings" is the option to enable TOR.) Relevant URLs: Orbot: https://guardianproject.info/apps/orbot/ DuckDuckGo browser at F-Droid: https://f-droid.org/packages/com.duckduckgo.mobile.android/
  • Byron York: Trump dossier probes now include possible State Department involvement

    01/16/2018 5:23:56 AM PST · by grayboots · 57 replies
    Washington Examiner ^ | 1/16/2018 | Byron York
    Congressional investigations into the Trump dossier have so far been focused on the FBI and Justice Department. They still are, but now investigators are also looking into a possible Obama State Department role in the collection and dissemination of sensational and still-unverified allegations against candidate Donald Trump gathered by a former British spy working for the Hillary Clinton campaign. In addition to having contacts in the Obama Justice Department and FBI, that former spy, Christopher Steele, was also well-connected with the Obama State Department. A book published in November by a correspondent at the Guardian, "Collusion: Secret meetings, dirty money,...
  • Video: Russian Navy Tests Tor-M2KM air defense missile system from Admiral Grigorovich Frigate

    03/30/2017 7:28:32 PM PDT · by sukhoi-30mki · 2 replies
    Navy Recognition ^ | 30 March 2017
    State-owned Russian-language news channel "Russia 24" published an interesting video showing at-sea test of a Russian Army Tor-M2KM air defense missile system from the Project 11356 frigate Admiral Grigorovich. The 9K331MKM module can be seen fitted on the helicopter pad of the frigate. Video: Russian Navy Tests Tor-M2KM air defense missile system from Admiral Grigorovich FrigateLaunch of a 9M331M surface to air missile from the self-contained combat module 9K331MKM short-range missile system Tor-M2KM, placed on the helicopter deck of the head frigate Admiral Grigorovich of Project 11356. Screenshot from "Russia 24" video (via bmpd.livejournal.com). The tests were conducted in the...
  • Browse free or die? New Hampshire library is at privacy fore[Tor]

    08/21/2016 7:58:03 PM PDT · by Theoria · 11 replies
    AP ^ | 26 June 2016 | Lynne Tuohy
    A small library in New Hampshire sits at the forefront of global efforts to promote privacy and fight government surveillance — to the consternation of law enforcement. The Kilton Public Library in Lebanon, a city of 13,000, last year became the nation's first library to use Tor, software that masks the location and identity of internet users, in a pilot project initiated by the Cambridge, Massachusetts-based Library Freedom Project. Users the world over can — and do — have their searches randomly routed through the library. Computers that have Tor loaded on them bounce internet searches through a random pathway,...
  • Mac malware gives attackers backdoor into OS X

    07/07/2016 10:11:59 PM PDT · by Utilizer · 11 replies
    iTnews (AUS) ^ | Jul 7 2016 3:36PM (AUS) | Staff Writer
    A newly discovered malware capable of cyber espionage and remote takeover is targeting Apple Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network. Named Eleanor (or Backdoor.MAC.Eleanor), the malware arrives disguised as a drag-and-drop file conversion application called the EasyDoc Converter. The application is found on many credible third-party sites, according to an analysis from Bitdefender, whose security researchers uncovered the malware. The program is neither verified nor digitally signed by Apple. In reality, the program's true purpose is far more malevolent, granting attackers a backdoor connection that...
  • Pressure mounts against Rule 41 – the FBI's power to hack Tor, VPN users on sight (Privacy Alert)

    06/22/2016 10:24:06 AM PDT · by dayglored · 20 replies
    The Register ^ | Jun 21, 2016 | Iain Thomson
    The campaign against Rule 41 – which will give cops and Feds in America the power to hack people's computers around the world – has kicked up a gear. Leaders of the US House of Representatives and Senate got a letter today urging them to block the rule change before it becomes permanent in December. The proposed legislative tweak, quietly passed by an obscure committee and approved by the Supreme Court in April, would allow a US magistrate judge to grant law enforcement access to any stored data on a computer, phone, or any storage device around the world that...
  • [October 21, 2015] Foundation of 'dark Web' steps into the light

    05/28/2016 5:32:14 PM PDT · by Cats Pajamas · 11 replies
    Politico ^ | 10/21/15 04:52 PM EDT | David Perera
    The Tor Project, the foundation of the crime-infiltrated "dark Web," is trying to soften its public image — but without backing away from the anonymous Web-surfing technology that has made it so controversial with law enforcement and intelligence agencies. For about a decade, the Massachusetts-based nonprofit has provided free software that lets activists and political dissidents visit websites and exchange messages outside the scrutiny of oppressive governments. But the same software HAS ALLOWED HIDDEN MARKETS FOR CHILD PORNOGRAPHY, GUNS, ILLEGAL DRUGS AND STOLEN CREDIT CARD INFORMATION TO FLOURISH, while heightening U.S. intelligence agencies' worries about technology providing an unbreakable wall...
  • How Ugandans Overturned An Election Day Social Media Blackout

    02/25/2016 7:20:06 PM PST · by Utilizer · 15 replies
    Motherboard online site ^ | February 24, 2016 // 07:00 AM EST | Written by G.S. Phillips and Grace Atuhaire
    When Ugandans went to the polls last Thursday in presidential and parliamentary elections, they participated in the most heavily-contested political battle since multiparty democracy began in 2005. But they also discovered that their access to social media and mobile payment services had been cut off, part of a three-day ban by the government that limited political discussion and temporarily halted financial transactions across the country. When the dust had cleared, incumbent, 30-year president Gen. Y.K. Museveni had been re-elected for another five-year term along with his National Resistance Movement (NRM) party, the leader of the largest opposition party was under...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 56 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Leaked NSA Documents Reveal How To Hide From The NSA

    01/01/2015 12:14:53 PM PST · by Libloather · 33 replies
    Huffington Post via MSN ^ | 1/01/15 | Damon Beres
    If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP. These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel. The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems "catastrophic" -- meaning the organization has "near-total loss/lack of insight to target communications," according to Der Spiegel. "Although the documents are around two years old,...
  • The Trouble with Tor

    12/17/2014 3:45:46 AM PST · by ShadowAce · 7 replies
    eSecurity Planet ^ | 16 December 2014 | Paul Rubens
    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or data on the Internet, whistle-blowers and dissidents who want to communicate with journalists, and anyone who wants to use the Internet without being tracked or to publish information on the Net without compromising their privacy.How Tor Works Tor works by sending traffic from its source...
  • FBI Arrests SpaceX Employee, Alleging He Ran The 'Deep Web' Drug Marketplace Silk Road 2.0

    11/06/2014 10:30:03 AM PST · by blam · 21 replies
    BI ^ | 11-6-2014 | James Cook
    James Cook November 6, 2014 The FBI and Europol have conducted a joint operation to take down the internet's thriving "deep web" drug marketplaces. The official FBI New York Twitter account just confirmed the seizure of Silk Road 2.0, saying that the site's alleged operator, Blake Benthall, was arrested in San Francisco on Wednesday. He now potentially faces life in prison, the FBI says. Benthall appears to be an employee of SpaceX, Elon Musk's private rocket company. (snip)
  • Researcher Finds Tor Exit Node Adding Malware to Binaries

    10/24/2014 6:54:44 PM PDT · by Utilizer · 22 replies
    The Kaspersky Lab Security News Service ^ | October 24, 2014 , 12:07 pm | Dennis Fisher
    A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan Security Group ran across the misbehaving Tor exit node while performing some research on download servers that might be patching binaries during download through a man-in-the middle attack. Downloading any kind of file from the Internet is a dodgy proposition these days, and many...
  • Here’s one way to land on the NSA watch list

    07/10/2014 6:41:50 AM PDT · by ShadowAce · 31 replies
    Wonky News Nerd ^ | 10 July 2014 | Julia Angwin and Mike Tigas
    Last week, German journalists revealed that the National Security Agency has a program to collect information about people who use privacy-protecting services, including popular anonymizing software called Tor. But it’s not clear how many users have been affected. So we did a little sleuthing, and found that the NSA’s targeting list corresponds with the list of directory servers used by Tor between December 2010 and February 2012 – including two servers at the Massachusetts Institute of Technology. Tor users connect to the directory servers when they first launch the Tor service.That means that if you downloaded Tor during 2011, the NSA may have scooped up your...