HackDig : Dig high-quality web security articles for hacker

DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from Tor exit relays. Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of se
Publish At:2016-10-02 18:50 | Read:2950 | Comments:0 | Tags:Breaking News Deep Web Hacking anonymity anonymizing Darknet

Tor Project and the new anti-tampering measures for its software

Tor Project revealed how the organization has conducted a three-year long work to improve its ability to detect fraudulent software. The experts at the Tor Project are working to improve the resilience of the anonymizing network to cyber attacks, in particular, they aim to quickly detect any surveillance activity conducted by tempering the Tor system. The re
Publish At:2016-03-23 01:35 | Read:2820 | Comments:0 | Tags:Breaking News Hacking Security anonymity anonymizing Darknet


Share high-quality web security related articles with you:)


Tag Cloud