@anon
sign up
@anon
sign up
pull down to refresh
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
305 sats
\
0 comments
\
@nym
29 Apr
security
related
Obscura: The VPN that can't track your activity
obscuravpn.io/
10.5k sats
\
28 comments
\
@k00b
27 Sep 2023
tech
Lightning authentication (LNURL-Auth)
16.5k sats
\
22 comments
\
@heisenberg
25 Nov 2022
bitcoin
An Ode to The Onion Router (Tor)
2743 sats
\
19 comments
\
@nullcount
24 Sep 2022
bitcoin
Going Dark: The war on encryption is on the rise — Mullvad
mullvad.net/en/why-privacy-matters/going-dark
2857 sats
\
16 comments
\
@sefiro
21 May
privacy
Nostr is Identity for the Internet
hivemind.vc/identity/
6727 sats
\
20 comments
\
@MaxAWebster
29 Apr
nostr
The Art of Invisibility by Kevin Mitnick | Mitnick Security
www.mitnicksecurity.com/the-art-of-invisibility-mitnick-security
2366 sats
\
21 comments
\
@ek
23 Feb
privacy
The Gentleperson’s Guide to Forum Spies
ronaldthomaswest.com/2017/08/21/the-gentlepersons-guide-to-forum-spies/
2805 sats
\
14 comments
\
@Coyote_Cosmico
29 Sep
culture
Tor Is Under Attack And Bitcoiners Must Help Fix It
bitcoinmagazine.com/culture/if-you-love-bitcoin-you-should-help-tor
1451 sats
\
21 comments
\
@HODL
12 Oct 2022
bitcoin
Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs
www.404media.co/inside-the-underground-site-where-ai-neural-networks-churns-out-fake-ids-onlyfake/
4366 sats
\
16 comments
\
@Roll
7 Feb
privacy
Signal’s New Usernames Help Keep the Cops Out of Your Messages
theintercept.com/2024/03/04/signal-app-username-phone-number-privacy/
3010 sats
\
16 comments
\
@Bitman
4 Mar
privacy
Extreme Privacy: Mobile Devices
inteltechniques.com/blog/2023/02/16/extreme-privacy-mobile-devices/
2659 sats
\
4 comments
\
@runningbitcoin
17 Feb 2023
bitcoin
It's time to take ownership of our privacy
3542 sats
\
11 comments
\
@doodlevaliumskies
17 Apr 2023
bitcoin
How I discovered the underground world of credit card network exploitation
chargebackstop.com/blog/card-networks-exploitation/
1019 sats
\
4 comments
\
@hn
2 Aug 2023
tech
My Extreme Privacy Journey - PART 2: GrapheneOS
20k sats
\
10 comments
\
@runningbitcoin
2 Nov
tutorials
The dangers of metadata in messengers
simplex.chat/blog/20240416-dangers-of-metadata-in-messengers.html
1536 sats
\
2 comments
\
@DEADBEEF
17 Apr
privacy
Widespread Attacks Push Tor to Proof-of-Work
darkdot.com/articles/tor-ddos-leads-to-proof-of-work/
187 sats
\
1 comment
\
@k00b
4 Apr 2023
bitcoin
Molly: A fork of Signal for Android with password lock, RAM wiper, Tor support
github.com/mollyim/mollyim-android
1356 sats
\
5 comments
\
@final
28 Jun 2023
tech
Smart TVs Are Like “a Digital Trojan Horse” In People’s Homes
arstechnica.com/gadgets/2024/10/streaming-industry-has-unprecedented-surveillance-manipulation-capabilities/
677 sats
\
10 comments
\
@0xbitcoiner
7 Oct
security
Extreme Privacy | Personal Data Removal Workbook | PDF | Michael Bazzel
inteltechniques.com/data/workbook.pdf
2093 sats
\
4 comments
\
@satoshiplanet
28 Feb
privacy
Wired’s Attack on Privacy
simplex.chat/blog/20241016-wired-attack-on-privacy.html
503 sats
\
6 comments
\
@Rsync25
16 Oct
alter_native
L402: The Missing Piece in the Internet's Payment Infrastructure | Hacker News
news.ycombinator.com/item?id=40971766
521 sats
\
5 comments
\
@Rsync25
16 Jul
lightning
more