When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting to. Read the rest
“The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack,” the EFF says. “The changes to Rule 41 would make it easier for them to break into our computers, take data, and engage in remote surveillance. Read the rest
Appelbaum, whose work has put him in the crosshairs of his own government and foreign states, resigned from the Tor project on Friday, accompanied by a short note from Tor executive director Shari Steele. Read the rest
A new research report from Citizenlab painstaking traces the origins of a series of sophisticated hacking attacks launched at Rori Donaghy, a UK journalist for Middle East Eye who founded the Emirates Center for Human Rights, which reports critically on the autocratic regime that runs the UAE, and 27 other targets. Read the rest
Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. Read the rest
Since November 2015, FBI agents have been trying to get Tor developer Isis Agora Lovecruft to meet with them, but they won't tell her or her lawyer why. Read the rest
The Supreme Court -- at the behest of the US government -- has announced changes to "Rule 41," a crucial procedure of the US court system, which will give law enforcement sweeping powers to hack into computers anywhere in the world, including victims' computers, with drastically reduced oversight. Read the rest
Trevor Paglen and Jacob Appelbaum collaborate to create beautiful, acrylic-encased computers that are also Tor nodes, anonymizing data that passes through them, and install the in art galleries all over the world, so that patrons can communicate and browse anonymously, while learning about anonymity and Tor. Read the rest
Everyone thinks libraries have a positive role to play in the world, but that role differs greatly based on whether you’re talking to a librarian or a patron. Ask a patron what libraries have in common and they’d probably answer: they share books with people. Librarians give a different answer: they share a set of values. It’s time for libraries to step up to those values by supporting access to the Internet and taking the lead in fighting to keep the Internet open, free, and unowned.
In just a few short years, ransomware -- malware that encrypts all the files on the computer and then charges you for a key to restore them -- has gone from a clever literary device for technothrillers to a cottage industry to an epidemic to a public menace. Read the rest
If you are a seller on Alphabay -- a darkweb site that sells "drugs, stolen data and hacking tools," you'll have to use two-factor authentication (based on PGP/GPG) for all your logins. Read the rest
Library workers at Western University's Graduate Resource Centre in London, Ontario, had a workshop from Alison Macrina, the library organiser whose Library Freedom Project won a battle with the US DHS over a library in New Hampshire that was offering a Tor exit node as part of a global network that delivers privacy, censorship resistance, and anonymity to all comers. Read the rest
Inspired by the Library Freedom Project's uncompromising bravery in the face of a DHS threat against a town library in Kilton, NH, that was running a Tor exit node to facilitate private, anonymous communication, the New Hampshire legislature is now considering a bill that would explicitly permit public libraries to "allow the installation and use of cryptographic privacy platforms on public library computers for library patrons use." Read the rest
The Torist is a newly launched literary journal, edited by University of Utah Communications associate professor Robert W Gehl and a person called GMH, collecting fiction, poetry and non-fiction. It is only available as a file on a Tor hidden service -- a "darkweb" site, protected by the same technology as was used by the likes of Silk Road. Read the rest
Tor, the internet anonymity network you can use to hide your activity from prying eyes, is beautiful in blue. Torflow is a visualization of the vast amounts of traffic streaming between its many nodes, delineating a map of the internet as it can't otherwise be seen.
You can add and remove activity associated with different components of the Tor network, and then watch as thousands of on-screen particles rapidly drain your mobile device's batteries.
Read the rest
Shari Steele, who served as the executive director of the Electronic Frontier Foundation for 15 years and built the organization from a six-person shoestring operation that didn't even have an office into a fifty+ person, multimillion-dollar powerhouse, has come out of retirement to serve as the new executive director for the Tor Foundation, which oversees the Tor and Tails privacy/anonymity projects. Read the rest
Despite the French Ministry of Interior's demands to crack down on Internet anonymity, Prime Minister Manual Valls has gone on record saying he won't allow such a thing to pass: Read the rest