Our Full-Service B2B Marketing Program Delivers Sales-Ready Leads Click to Learn More!
Welcome Guest | Sign In
ECommerceTimes.com

Results 1-20 of 66 for Tor (0.001 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Erika Morphy
Tor Stands Tall Against the NSA
10/07/13 5:04 PM PT | TechNewsWorld | 677 Words

... National Security Agency tried to crack the encryption protecting the Tor network -- known as a bulletproof vehicle for anonymous communication -- but was unable to do so, according to news reports based on revelations provided by former NSA systems administrator Edward...

Richard Adhikari
FBI Attack on Child Porn Sites May Have Blown Tor Users' Cover
08/05/13 2:52 PM PT | TechNewsWorld | 755 Words

... Freedom Hosting, which hosted several servers on the Tor Project's hidden network, has been taken down through a vulnerability in the Firefox browser -- and the FBI is widely suspected of being the attacker. The FBI is seeking to extradite Freedom Hosting's...

Katherine Noyes
Tor Embroiled in $1M Revenge-Porn Lawsuit
07/09/14 5:26 PM PT | LinuxInsider | 837 Words

Van Dyke recently filed a lawsuit against nude-photo-sharing site Pink Meth and included the Tor Project among its defendants. Pink Meth is an "involuntary pornography" site, the suit charges, enabling users to post nude photos for the purposes of getting revenge on those...

Richard Adhikari
Tor Has Been Breached - What Now?
08/01/14 4:21 PM PT | TechNewsWorld | 644 Words

... that two Carnegie-Mellon CERT researchers have developed an inexpensive way to breach the Tor network has the project, privacy advocates, and probably criminals who use the network equally concerned. The Tor Project posted has advised relays to upgrade to Tor 0.2.r.23e or...

John P. Mello Jr.
FBI Paid Carnegie Mellon $1M to Crack User IDs, Claims Tor
11/17/15 3:47 PM PT | TechNewsWorld | 856 Words

... Tor Project last week claimed the FBI paid Carnegie Mellon University $1 million to crack the anonymity of Tor users. Tor's claim appears to have been triggered by a report last week in Motherboard that said the FBI's arrest of an alleged...

Richard Adhikari
The Trouble With Facebook's Tor Link
11/05/14 7:07 AM PT | TechNewsWorld | 626 Words

... recently announced that it was providing access directly over the Tor network . Its purpose was to let users access Facebook without losing the cryptographic protections provided by the Tor cloud.

Facebook is providing an SSL certificate which cites its onion...

Katherine Noyes
Black Hat Tor-Busting Talk Nixed
07/22/14 4:02 PM PT | TechNewsWorld | 768 Words

The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk, entitled "You Don't Have to...

John P. Mello Jr.
FBI, Carnegie Mellon Deny $1M Contract to Crack Tor
11/19/15 12:11 PM PT | TechNewsWorld | 1674 Words

The Tor Project , which operates the network, last week accused the FBI of cutting the CMU deal.

The attack on Tor occurred from January to July 2014. The attackers discovered a way to strip the anonymity of Tor users by tracking...

Katherine Noyes
Kickstarter Puts Kibosh on Tor-Based Router Funding
10/21/14 7:00 AM PT | TechNewsWorld | 632 Words

... on Friday suspended a crowdfunding campaign for Anonabox , a portable networking device designed specifically to run Tor. The campaign for the privacy-minded router, which launched earlier last week, was wildly successful . In just a few days, it reportedly garnered...

John P. Mello Jr.
Internet Lib Group Backs Anonymity Project
12/27/04 5:10 AM PT | TechNewsWorld | 620 Words

The Electronic Frontier Foundation (EFF) of San Francisco said in a statement that it is sponsoring the Tor Project, which has created an open-source application to help users remain anonymous when they surf the Web.

According to EFF Technology Manager Chris Palmer,...

John P. Mello Jr.
Twitter Alerts Users to State-Sponsored Cyberattack Threat
12/15/15 1:56 PM PT | TechNewsWorld | 799 Words

Tor Connection
"State actors behave differently than criminals," said Eva Galperin, a global policy analyst with the Electronic Frontier Foundation .

"In the case of Twitter or any large company providing a platform or service, they have the 10,000-foot...

Richard Adhikari
ProPublica Launches News Site on Dark Web
01/12/16 7:00 AM PT | TechNewsWorld | 589 Words

The Tor hidden service goes beyond SSL in that visits to sites are hidden from eavesdroppers and Internet service providers.

Anyone monitoring the various Tor nodes can track visitors who use a Tor browser to view ProPublica's regular site. Using the...

Katherine Noyes
Firefox Develops a Case of Selective Amnesia
11/11/14 3:05 PM PT | LinuxInsider | 697 Words

Working With Tor
Also as part of Mozilla's Monday suite of anniversary announcements, the nonprofit kicked off Polaris, a new privacy initiative that it's undertaking in partnership with the Center for Democracy & Technology and the Tor Project.

As...

Richard Adhikari
The Law Scores a Victory Against Dark Net Denizens
11/07/14 2:43 PM PT | E-Commerce Times | 627 Words

Federal Bureau of Investigation and Eurojust have taken down more than 400 cybercrime services accessible via the Tor browser. They include the dark market Silk Road 2.0. Its operator, San Francisco resident Blake Benthall, was arrested, along with six Britons.

Europol coordinated...

John P. Mello Jr.
Ashley Madison Hackers: Catch Them if You Can
08/20/15 4:37 PM PT | TechNewsWorld | 698 Words

The hackers this week dumped nearly 10 gigabytes of stolen personal data onto the Web -- details gleaned from accounts established on the site, which is dedicated to matching up people who want to engage in extramarital affairs. "In this case, the hackers seemed to have taken all necessary precautions to protect their anonymity while utilizing the Dark Web via Tor, ...

Dietrich T. Schmitz
5 Ways to Improve Your Privacy Online
07/30/13 5:00 AM PT | TechNewsWorld | 1831 Words

A more difficult-to-trace method for surfing the Web is called Tor. Essentially, when you install Tor software, you log onto a peer-to-peer (P2P) network representing millions of people, much in the way BitTorrent works. It is encrypted and fully decentralized, meaning...

Katherine Noyes
Wiliest Ways to Keep the NSA at Bay
02/28/14 3:36 PM PT | LinuxInsider | 1326 Words

In addition, the Tor Web browser is "a good idea," he said. "I would recommend using Tor for visiting any website you would prefer to not have recorded."

'Deliberate Back Doors and Stupid Bugs'
On the road, if you're...

Erika Morphy
Internet Access Severely Curbed in Iran
02/10/12 3:32 PM PT | TechNewsWorld | 604 Words

The Iranian government appears to have ramped up censorship through deep packet inspection of SSL traffic, selective blocking of IP Address and TCP port combinations, and some keyword filtering, according to proxy solution provider Tor . They have partially blocked access to...

John P. Mello Jr.
Malvertisers Use Digital Fingerprints to Avoid Detection
03/04/16 10:14 AM PT | TechNewsWorld | 2166 Words

Identity thieves appear to be getting craftier in covering their tracks on the Net by using Tor , an open source technology designed to anonymize a person's identity on the Internet.

"Roughly two-thirds of attackers used Tor to hide their location,"...

Richard Adhikari
Snowden's Beloved Tails OS Reaches v1.0 Milestone
05/01/14 2:29 PM PT | LinuxInsider | 604 Words

They include a Web browser upgrade, a Tor upgrade, and client-side blacklists for all Tor directory authority keys vulnerable to the OpenSSL Heartbleed flaw.

Tails "is a nicely packaged distribution of common security tools like Tor and PGP," Daniel Castro, senior analyst...

1 2 3 4 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Content Marketing on ALL EC
Which tech social media influencer has the greatest influence on your thinking?
Blogger Robert Scoble
Facebook's Mark Zuckerberg
Recode's Kara Swisher
Tech Evangelist Guy Kawasaki
Tesla and SpaceX's Elon Musk
Twitter's Jack Dorsey
Someone else