The Tor Project has joined with HackerOne to launch a public bug bounty program aimed at finding vulnerabilities which could compromise the anti-surveillance network. The Tor network is a system of ...
Malware writers are increasingly considering the Tor anonymity network as an option for hiding the real location of their command-and-control (C&C) servers, according to researchers from security firm ...
The Tor network is designed to cloak its users with powerful location- and identity-masking technology as they use the Internet. It’s no surprise, then, that eavesdroppers regularly try to pierce that ...
On Friday, a post on the Tor Project’s blog sent out an alarming message: “The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days.” More than 2 ...
A single malicious entity controls nearly a quarter of all nodes used on the anonymous internet provider Tor Network and is using its position to steal bitcoin and other cryptocurrencies. A ...
The U.S. National Security Agency has successfully undermined anonymity in the Tor network, according to newly released documents leaked by former NSA contractor Edward Snowden. Tor is a technology ...
Threat actors or nation-states looking into degrading the performance of the Tor anonymity network can do it on the cheap, for only a few thousands US dollars per month, new academic research has ...
The operator of an underground marketplace hosted within the Tor network has reported a flaw in Tor that he claims is being used for an ongoing denial of service attack on the site. The problem, which ...
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results