Home » Tag Archives: users

Tag Archives: users

Snowden Documents Reveal the NSA Has Been Tracking Bitcoin Users Since at Least 2013

A series of documents recently published by The Intercept shows that the NSA has been tracking Bitcoin users for years. The documents were provided by NSA whistleblower Edward Snowden. While many other federal agencies are paying private contractors, such as Chainalysis, to provide information on Bitcoin transactions and users, the US intelligence community has been running their own cryptocurrency surveillance ... Read More »

Hotspot Shield VPN is Leaking Users Data and Location

A security researcher has found that one of the world’s largest Virtual Private Network (VPN) providers is leaking users private information. Hotspot Shield, which has been downloaded over half a billion times and has been in operation for over a decade, has a bug which can reveal what country a user is located in, as well as leak the name ... Read More »

An Overview of Darknet Drug Purchasing Activity Among Australian Drug Users

The Silk Road was by far the first cryptomarket, or darknet marketplace, to gain international recognition in 2011 as an online trading platform facilitating illicit drug trafficking. Since then, the number of darknet marketplaces have greatly increased, and even though a wide range of illegal products are offered on these online marketplaces (stolen credit/debit cards, weapons and counterfeited legal documents ... Read More »

Internet users will go to darknet In Russia

Since November 1, a law regulating usage of VPN services and anonymizers in Russia is in full force. For Internet users it has become more difficult to get out of any Russian censorship. “Novaya Gazeta” interviewed Artem Kozlyuk in order to find out how the new act works and how users “survive” in harsh circumstances. Kozlyuk is the head of ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

phisherdarkweb

Google Study Says Phishing Attacks Are the Biggest Threats to Web Users

A study by Google discovered that phishing attacks through fake emails were as effective as compared to data breaches that exposed usernames and passwords. Cyber criminals or cyber groups manage to steal over 25,000 valid sets of web credentials for Gmail accounts every week, painting a picture of the extent this problem has reached. Hackers are constantly searching for, and ... Read More »

μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users

Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the ... Read More »

New Zealand’s “Operation Tiger” Targeted Young Darknet Users

As part of an operation that began in 2016, New Zealand law enforcement officials raided one dozen homes and arrested 13 suspects in early August. Investigators believed that all 13 suspects had acted in “furtherance” of drug distribution networks valued at millions of dollars. NZ authorities accused the group of drug importation, possession, distribution, among other crimes exclusive to specific ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

Screenshot_20170818_061335.png

Valhalla Market Compromised: Finnish Customs Allegedly Identified Hundreds of Valhalla Users

According to a press release issued by Finnish Customs on August 17, a Customs investigation had “exposed” a large-scale drug trafficking network. The network—or in this case, drug trafficking organization—operated from within Finland. From there, they distributed their products to buyers both in Finland and across the globe. Central to the operation was the darknet marketplace known as “Valhalla” or ... Read More »

UK Targets Dark Web Users in Anti-Terrorism Pamphlet

As part of an ongoing counter-terrorism campaign, police in London started encouraging citizens to report specific types of suspicious activity. Although the material police handed out contained numerous examples of suspicious activity in relation to terrorism, one of the examples was “visiting the dark web.” Another example in the counter-terrorism pamphlet was “ordering unusual items online.” This follows a long ... Read More »

Using Bitcoin To Incentivize Users Of Distributed P2P Applications

The efficiency of a decentralized peer-to-peer (P2P) application is mainly determined by the effective collaboration of users of mobile devices. Each and every user should be incentivized to compensate for consumption of computing resources as he/she collaborates with other users across the P2P network. On the other hand, appropriate incentivizing mechanisms that comply with the diversified requirements of users within ... Read More »

UK Government to Spy on Users by Asking Messaging Apps to Weaken Encryption

Last week, British Prime Minister Theresa May received harsh criticisms from experts for her proposal to regulate the internet and essentially weaken encryption of messaging applications such as Whatsapp and Telegram. In a response to a terror attack that occurred in London, May stated that the act of terror can be attributed to the existence of “safe spaces” on the ... Read More »