German news outlets reported that police were able to de-identify a Tor user involved in a child sexual abuse network, but the Tor Project says the techniques used appear to rely on an outdated Tor ...
Identifying users who access Tor hidden services—websites that are only accessible inside the Tor anonymity network—is easier than de-anonymizing users who use Tor to access regular Internet websites.
Rochester Institute of Technology cybersecurity professor Billy Brumley is helping shed light on dark corners of the internet. Brumley and a multidisciplinary group of researchers from around the ...
The Tor network is in danger of being swamped by criminals abusing its anonymity to hide an underworld of parasitic botnets, malicious command and control and ‘darknet’ markets, according to research ...
19 Tor exit relays used self-signed certificates to launch man-in-the-middle attacks against HTTPS and SSH connections Computer scientists found almost 20 exit relays in the Tor anonymity network that ...
On Friday, a post on the Tor Project's blog sent out an alarming message: "The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days." More than 2 ...
The Tor Project has explained its recent decision to remove multiple network relays that represented a threat to the safety and security of all Tor network users. Tor network relays are routing points ...
Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses. The websites were set ...
The Tor Project has released Tor Browser 13.5, bringing several improvements and enhancements for Android and desktop versions. The Tor Browser is a specialized open-source web browser designed for ...
The Tor Project is seeking to allay fears that its veil of privacy has been pierced. A new report on German efforts to remove illicit content from the Tor network spiked fears that law enforcement had ...
The hacktivist group Anonymous has targeted child pornographers who use the hidden services of the Tor network with a pair of attacks on sites, and promises more. The attacks highlight the darker side ...