@anon
sign up
@anon
sign up
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
305 sats
\
0 comments
\
@nym
29 Apr
security
related
Obscura: The VPN that can't track your activity
obscuravpn.io/
10.5k sats
\
28 comments
\
@k00b
27 Sep 2023
tech
An Ode to The Onion Router (Tor)
2743 sats
\
19 comments
\
@nullcount
24 Sep 2022
bitcoin
Going Dark: The war on encryption is on the rise — Mullvad
mullvad.net/en/why-privacy-matters/going-dark
2857 sats
\
16 comments
\
@sefiro
21 May
privacy
Tor’s shadowy reputation will only end if we all use it
www.engadget.com/tor-dark-web-privacy-secure-browser-anonymous-130048839.html
2448 sats
\
14 comments
\
@kristapsk
28 Jul 2023
tech
Nostr is Identity for the Internet
hivemind.vc/identity/
6727 sats
\
50k boost
\
20 comments
\
@MaxAWebster
29 Apr
nostr
The Hitchhiker’s Guide to Online Anonymity
anonymousplanet-ng.org/guide.html
853 sats
\
10 comments
\
@bataroot
13 Jul 2022
bitcoin
The Art of Invisibility by Kevin Mitnick | Mitnick Security
www.mitnicksecurity.com/the-art-of-invisibility-mitnick-security
2366 sats
\
21 comments
\
@ek
23 Feb
privacy
Tor Is Under Attack And Bitcoiners Must Help Fix It
bitcoinmagazine.com/culture/if-you-love-bitcoin-you-should-help-tor
1451 sats
\
21 comments
\
@HODL
12 Oct 2022
bitcoin
Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs
www.404media.co/inside-the-underground-site-where-ai-neural-networks-churns-out-fake-ids-onlyfake/
4353 sats
\
16 comments
\
@Roll
7 Feb
privacy
Signal’s New Usernames Help Keep the Cops Out of Your Messages
theintercept.com/2024/03/04/signal-app-username-phone-number-privacy/
3010 sats
\
16 comments
\
@Bitman
4 Mar
privacy
Extreme Privacy: Mobile Devices
inteltechniques.com/blog/2023/02/16/extreme-privacy-mobile-devices/
2659 sats
\
4 comments
\
@runningbitcoin
17 Feb 2023
bitcoin
It's time to take ownership of our privacy
3542 sats
\
11 comments
\
@doodlevaliumskies
17 Apr 2023
bitcoin
How I discovered the underground world of credit card network exploitation
chargebackstop.com/blog/card-networks-exploitation/
1019 sats
\
4 comments
\
@hn
2 Aug 2023
tech
Secure File Sharing: Protect your information with these essential tools
892 sats
\
7 comments
\
@Monotone
16 May 2023
bitcoin
The dangers of metadata in messengers
simplex.chat/blog/20240416-dangers-of-metadata-in-messengers.html
1536 sats
\
2 comments
\
@DEADBEEF
17 Apr
privacy
Tor’s new WebTunnel bridges mimic HTTPS traffic to evade censorship
www.bleepingcomputer.com/news/security/tors-new-webtunnel-bridges-mimic-https-traffic-to-evade-censorship/
777 sats
\
1 comment
\
@DEADBEEF
13 Mar
privacy
Widespread Attacks Push Tor to Proof-of-Work
darkdot.com/articles/tor-ddos-leads-to-proof-of-work/
187 sats
\
1 comment
\
@k00b
4 Apr 2023
bitcoin
Molly: A fork of Signal for Android with password lock, RAM wiper, Tor support
github.com/mollyim/mollyim-android
1356 sats
\
5 comments
\
@final
28 Jun 2023
tech
Privacy on mobile devices
nethemba.com/how-to-maximize-anonymity-when-accessing-the-internet-on-mobile/
768 sats
\
1 comment
\
@robbabuona
26 Dec 2023
privacy
Three Million Malware — Infected Smart Toothbrushes Used in Swiss DDoS Attacks
www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages
1939 sats
\
4 comments
\
@0xbitcoiner
6 Feb
security
Extreme Privacy | Personal Data Removal Workbook | PDF | Michael Bazzel
inteltechniques.com/data/workbook.pdf
2093 sats
\
4 comments
\
@satoshiplanet
28 Feb
privacy
more