@anon
sign up
@anon
sign up
pull down to refresh
Forget IPs: using cryptography to verify bot and agent traffic
blog.cloudflare.com/web-bot-auth/
33 sats
\
0 comments
\
@carter
15 May
security
related
LinkingLion: An entity linking Bitcoin transactions to IPs?
b10c.me/observations/06-linkinglion/
51.8k sats
\
15 comments
\
@0xB10C
28 Mar 2023
bitcoin
Nostr is Identity for the Internet
hivemind.vc/identity/
6727 sats
\
20 comments
\
@MaxAWebster
29 Apr 2024
nostr
An Ode to The Onion Router (Tor)
2743 sats
\
19 comments
\
@nullcount
24 Sep 2022
bitcoin
Mobile Bot Farms are Evolving (proof-of-work is needed)
1062 sats
\
9 comments
\
@nullcount
23 Mar 2024
tech
Spaces Protocol: Scalable & Permissionless Bitcoin Identities
spacesprotocol.org/
4568 sats
\
10 comments
\
@ca98am79
22 Feb 2024
bitcoin
Bot Army that Scams Scammers
www.youtube.com/watch?v=ZDpo_o7dR8c
1056 sats
\
1 comment
\
@OneOneSeven
24 Mar
security
This Undisclosed WhatsApp Vulnerability Lets Governments See Who You Message
theintercept.com/2024/05/22/whatsapp-security-vulnerability-meta-israel-palestine/
390 sats
\
5 comments
\
@sefiro
25 May 2024
security
Proof-of-Work Defense for Onion Services
blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/
10.3k sats
\
8 comments
\
@hn
24 Aug 2023
tech
Tor’s new WebTunnel bridges mimic HTTPS traffic to evade censorship
www.bleepingcomputer.com/news/security/tors-new-webtunnel-bridges-mimic-https-traffic-to-evade-censorship/
777 sats
\
1 comment
\
@DEADBEEF
13 Mar 2024
privacy
BitVM 2: Permissionless Verification on Bitcoin
gist.github.com/RobinLinus/2251939ba074bd8af80a3826b1983246
2362 sats
\
1 comment
\
@Rsync25
25 Mar 2024
bitdevs
Tor DDOS mitigation proposals: POW and tokens
191 sats
\
2 comments
\
@EnormousPony
28 Jun 2022
bitcoin
Zero-Knowledge Proofs of Training for Deep Neural Networks
eprint.iacr.org/2024/162
2026 sats
\
5 comments
\
@0xbitcoiner
5 Feb 2024
crypto
Tor — From the Dark Web to the Future of Privacy
518 sats
\
0 comments
\
@0xbitcoiner
26 Apr 2024
BooksAndArticles
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
305 sats
\
0 comments
\
@nym
29 Apr 2024
security
Widespread Attacks Push Tor to Proof-of-Work
darkdot.com/articles/tor-ddos-leads-to-proof-of-work/
187 sats
\
1 comment
\
@k00b
4 Apr 2023
bitcoin
Nostr Stealth: designed to ensure sender and receiver metadata full anonymity
github.com/eddieoz/nostr-stealth
886 sats
\
0 comments
\
@Rsync25
29 Aug 2023
nostr
Free VPN apps turn Android phones into criminal proxies | Malwarebytes
www.malwarebytes.com/blog/news/2024/04/free-vpn-apps-turn-android-phones-into-criminal-proxies
137 sats
\
4 comments
\
@ch0k1
2 Apr 2024
security
‘TunnelVision’ Attack Leaves Nearly All VPNs Vulnerable to Spying
www.wired.com/story/tunnelvision-vpn-attack/
206 sats
\
1 comment
\
@jakoyoh629
18 May 2024
security
How to Exchange Bitcoin Lightning to Onchain, Without Leaving Telegram
2493 sats
\
9 comments
\
@Rockedf
1 Dec 2023
bitcoin
Payment Censorship in the Lightning Network Despite Encrypted Communication
drops.dagstuhl.de/storage/00lipics/lipics-vol316-aft2024/LIPIcs.AFT.2024.12/LIPIcs.AFT.2024.12.pdf
201 sats
\
1 comment
\
@Rsync25
29 Sep 2024
lightning
TorBox — an easy to use, anonymizing router based on Raspberry Pi
github.com/radio24/TorBox
5633 sats
\
3 comments
\
@astronaut
17 Mar 2023
bitcoin
more