Breaking News and Updates
- Abolition Of Work
- Alternative Medicine
- Artificial Intelligence
- Atlas Shrugged
- Ayn Rand
- Basic Income Guarantee
- Chess Engines
- Cloud Computing
- Conscious Evolution
- Cosmic Heaven
- Designer Babies
- Donald Trump
- Ethical Egoism
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom of Speech
- Gene Medicine
- Genetic Engineering
- Germ Warfare
- Golden Rule
- Government Oppression
- High Seas
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Longevity
- Immortality Medicine
- Intentional Communities
- Life Extension
- Mars Colonization
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- New Utopia
- Personal Empowerment
- Political Correctness
- Politically Incorrect
- Post Human
- Post Humanism
- Private Islands
- Quantum Computing
- Quantum Physics
- Resource Based Economy
- Ron Paul
- Second Amendment
- Second Amendment
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Teilhard De Charden
- The Singularity
- Tor Browser
- Transhuman News
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Zeitgeist Movement
The Evolutionary Perspective
Category Archives: Tor Browser
Posted: August 25, 2017 at 3:45 am
Last year, a 16-year-old Mexican schoolboy received an unsolicited text message making crude sexual taunts. The text attempted to lure him into clicking on a link at the bottom of the message. Had he clicked on the link, his smartphone would have been secretly compromised, allowing those targeting him to monitor everything he did, steal login details, upload his contacts list and even spy on him through his phones own microphone and camera.
Whoever sent the message was using an incredibly sophisticated piece of spyware created by an Israeli company called NSO Group, which says it only sells its tools to governments and law enforcement agencies around the world. It is designed to track and monitor terrorists and other high-profile criminals.
The researchers say they have no conclusive evidence attributing these messages to specific government agencies in Mexico. However, circumstantial evidence suggests that one or more of NSOs government customers in Mexico are the likely operators.
Many people on this side of the Atlantic reading this report may be shocked to hear of a government using spying tools to hack the smartphones belonging to activists and journalists. At the same time, most people will likely shrug their shoulders and say: Sure why would anyone want to spy on me, Ive got nothing to hide?
But this is not about having something to hide, it is about privacy. There are many things we all do everyday which we dont want most people knowing about: How often did you go to the toilet today? Did you have sex today? Did you look up something online you wouldnt tell your family or friends about?
We are all entitled to a private life, and that goes for our digital lives as well as our offline lives. And so, we should all be concerned about the use of hyper-sophisticated tools like those from the NSO Group being used against a 16-year-old boy.
The simple fact of the matter is that is you have enough resources, then you can pretty much hack into anything as long as it is connected to the internet. The problem for you and me is the cost of compromising our lives is dropping precipitously and the barrier which criminals have to hurdle to find out the most intimate details of our lives is getting lower and lower.
With such powerful tools available, the question arises, is there anything I can do to protect myself? The short answer is not really. If a committed adversary really wants to hack into your smartphone, then they will likely be able to succeed.
However, that doesnt mean you should just give up completely and surrender your digital life to anyone who wants to to take a look.
Here are some basic ways to harden your online security to make what you do more private:
Stop telling them everything:Every online service that doesnt charge you to use it (Google, Facebook, Twitter) is using your data as payment. When you sign up they require a minimum level of information, but ask for a whole lot more. If you dont want Facebook knowing when your birthday is, then dont tell it. If you dont want Google to know what your favorite pet it, dont tell it. Oversharing of information is rife today on social media, and while we may blame Facebook and Snapchat, the real culprit is ourselves. If you dont want anyone to know about it, just dont share it.
Use the Tor browser:Tor, short for The Onion Router, is a modified version of the Firefox browser which anonymizes your identity by routing your IP address through multiple nodes until no one knows where the traffic is coming from or going to. Often associated with the dark web, it is not just a tool for criminals, but one that can be used by anyone who values their privacy.
Dont eat the cookies:Third-party cookies are the little bits of code websites use to track your movements online. They are the reason why Facebook will show you adverts for the nappies you were just looking at on Amazon. Now through every major browser offers the ability to turn off tracking cookies. It wont stop the more determined companies tracking you, but it does shut down the most common vector used by advertisers to build usage profiles.
Patch, patch, patch:Keep your software up to date. One of the easiest ways for any hacker to compromise your system is to use vulnerabilities in older versions of software. So whether its iOS, Android or Windows, always make sure you have installed the latest version available to you.
Free Wi-Fi may not be your friend:We all love connecting to free Wi-Fi, particularly when were travelling. But this is one of the easiest methods for hackers to compromise a lot of peoples data in a very short space of time. Make sure the network you are connecting to is safe, particularly in locations like airports and train stations.
See the original post:
Is there anything we can do to stop someone spying on us? – Newstalk 106-108 fm
Posted: August 20, 2017 at 5:54 pm
Quick question: What do you do when you want to browse the internet securely? Do you click on your browser menu and select your browser’s privacy mode and go about your merry way, assuming your data is safe and your history not saved. I’ve got news for you; chances are that private or incognito mode isn’t exactly what it’s cracked up to be.
I’ve tested both Chrome and Firefox and have witnessed both of them retaining browser history. What does this mean for you, the user? It means if you need serious privacy for your web browsing, or if you need to safeguard data while working on company sites, you might have to turn to a speciality browser, such as Tor Browser or Epic Browser. Tor Browser is available for all platforms, and Epic Browser is only available for Mac and Windows. Both browsers not only ensure your history will not be retained, but they also work with the help of a proxy system to keep your browsing encrypted and private.
So, if you’re looking for the highest level of security in a browser, look away from the the likes of Edge, Chrome, and Firefox and turn your sites on Tor and Epic. Both of these browsers are surprisingly easy to use and will go a long way to keep your data safe. Are they perfect? Are the superior than what you’re using now? Chances are, the answer to that question is a resounding yes.
Image: Jack Wallen
Posted: at 5:54 pm
Infamous neo-Nazi website The Daily Stormer is no longer accessible online via a conventional web browser. But a Monday essay seems to have caught the eye of President Trump.
Instead, site visitors need to download the Tor browser and use that to access the notorious neo-Nazi website at dstormer6em3i4km.onion. The Tor browser facilitates anonymous browsing.
On Sunday 13 August, the site published a crude and highly criticized article attacking Heather Heyer, the woman killed in the Charlottesville melee.
Monday Daily Stormer publisher Andrew Anglin authored an essay (pdf) condemning protestors who topped a Confederate statue in Durham, NC.
And I guarantee you, [the protesters] are going to go to Washington, and they are going to demand that the Washington Monument be torn down. They might even try to pull it down. Because George Washington owned slaves. More importantly, he was a white man who built something.
Also on Monday, former Congressman Newt Gingrich (whose wife is in the Administration) and Fox host Martha MacCallum were discussing the announcement that the Lexington, KY, mayor intends to remove two Confederate statues from a public building.
Where are you going to stop it? Gingrich said. What if you werent sensitive enough to the Holocaust we should take down all the statues of Franklin Delano Roosevelt? You could make an argument for that.
You could make an argument for Thomas Jefferson or George Washington, MacCallum interjected. Are you going to change the name of the Washington Monument?
Gingrich then noted that both were slave owners.
Absolutely, thats my point, MacCallum responds.
Its not a surprise that these points from FOX and The Daily Stormer were reprised in President Trumps press conference on Tuesday:
many of those people were there to protest the taking down of the statue of Robert E. Lee. So this week, it is Robert E. Lee. I noticed that Stonewall Jackson is coming down. I wonder, is it George Washington next week? And is it Thomas Jefferson the week after? You know, you really do have to ask yourself, where does it stop?
Was George Washington a slave owner? So will George Washington now lose his status? Are we going to take down excuse me are we going to take down statues to George Washington? How about Thomas Jefferson?
Trumps comments were widely criticized:
That wasnt the only eyebrow-raising act of the day:
Trump RT’d this pic showing a CNN journalist hit by a train days after a white nationalist ran his car into activists, killed Heather Heyer. pic.twitter.com/tWjdoE70AS
Kyle Griffin (@kylegriffin1) August 15, 2017
Aug 16, 2017KATHY GILL, Technology Policy Analyst
Posted: August 18, 2017 at 4:53 am
The Tor Project says it can’t build open source tools for circumventing censorship if it also controls who uses those tools.
A day after The Daily Stormer retreated to the darknet, the organization that helped make that move possible is condemning the neo-Nazi site while grudgingly acknowledging its technology allows the site to continue to spew messages of hate.
A version of the site, dubbed the “top hate site in America,” appeared Wednesday on a part of the web that can only be accessed through the Tor Project’s browser, which hides users’ online identities. The Daily Stormer moved to a Tor onion service after GoDaddy and then Googlepulled its domain following an offensive story it published about Heather Heyer, who was killed on Saturday while counter-protesting against white supremacist protesters in Charlottesville, Virginia.
“We are disgusted, angered, and appalled by everything these racists stand for and do,” Tor member Steph wrote in a blog post Thursday. “Ironically, the Tor software has been designed and written by a diverse team including people of many religions, races, gender identities, sexual orientations, and points on the (legitimate, non-Nazi) political spectrum.
“We are everything they claim to despise,” Steph wrote. “And we work every day to defend the human rights they oppose.”
With the move, the Tor Project joins a slew of companies and organizations seeking to distance themselves from white supremacist activity on the web. Apple and PayPal have disabled support of their services at websites that sell merchandise glorifying white nationalists and support hate groups, while Reddit and Facebook have each banned entire hate groups.
Click to see our in-depth coverage of online hatred.
On Wednesday, internet security provider Cloudflare dropped its support for the website, essentially allowing it to be taken down with a denial-of-service attack. Twitter also joined the campaign by suspending the accounts linked to the the website.
Steph pointed out the Tor browser is designed to defeat censorship, and the organization can’t and shouldn’t decide who benefits from that freedom.
“We can’t build free and open source tools that protect journalists, human rights activists, and ordinary people around the world if we also control who uses those tools,” Steph wrote. “Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us.”
Solving for XX: The industry seeks to overcome outdated ideas about “women in tech.”
Special Reports: All of CNET’s most in-depth features in one easy spot.
Posted: August 16, 2017 at 5:52 pm
After being refused service by two domain registrars and a hosting provider, a notorious neo-Nazi site has apparently fled to a Russian domain and a new server host, with a backup on the dark web.
The Daily Stormer came under fire following the events in Charlottesville, Virginia, over the weekend. The neo-Nazi website had its account terminated with domain registrar GoDaddy on Sunday after Twitter users complained about a post lobbing insults and slurs at Heather Heyer, the anti-racism demonstrator who was killed in Charlottesville. The website also quietly had its server hosting disabled by hosting company Scaleway. And even though the website quickly moved to another domain registration company, Google, Google promptly terminated its account.
Thus, heading into Tuesday, the site founded by prominent neo-Nazi Andrew Anglin in 2013 was essentially bouncing around looking for places to land. It briefly attempted to gain hosting through a Chinese service provider at the URL DailyStormer.wang, only to quickly be taken offline.
Next, the site attempted to set up shop on the dark web, using a .onion domain. Websites on the dark web are hidden from search engines and can only be accessed by special browsers such as a Tor browser. But the sites move underground didnt last long. Currently its home on the dark web is a parked announcement that it has relocated to DailyStormer.Ru:
The .ru domain in the URL isnt exactly proof that the website is now hosted in Russia, because anyone can register a .ru domain. A Whois lookup for the .ru site reveals that the controversial hosting proxy CloudFlare, which has refused to terminate its business relationship with the neo-Nazi forum, continues to mask the identity of the sites true server host.
On the website, Anglin celebrated the sites return with a litany of anti-Semitism and criticism of GoDaddy and Google, calling the latter an anti-speech site. He also took the opportunity to deliver more insults against Heyer, whose memorial is today.
Update: The Dailystormer.ru domain now appears to be offline as well; the .onion domain accessible via Tor browser has not updated. We are following developments and will update this article as new iterations of the site appear.
Posted: August 14, 2017 at 11:51 am
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
This release features an important security update to Tor.
The rest is here:
Tor Browser 7.0.4 Download – TechSpot
Debian-Based Tails 3.1 Anonymous OS Debuts with Tor Browser 7.0.4, Linux 4.9.30 – LXer (press release)
Posted: August 11, 2017 at 5:52 pm
Tails, the amnesic incognito live system, also known as the anonymous live operating system, has been updated today to version 3.1, a point release that fixes many security issues and updates important components.
Tails 3.1 is here with the latest Tor Browser 7.0.4 anonymous web browser and the Linux 4.9.30-2+deb9u3 LTS kernel, which is also used by default in Debian Stretch. The new release was synced with the upstream repositories of the Debian GNU/Linux 9.1 “Stretch” operating system.
Among other noteworthy changes implemented in Tails 3.1, we can mention a fix for a bug that lets the Mozilla Thunderbird email and news client erase its temporary directory, which might contain previously opened attachments, as well as updated “Tor is ready” and time synchronization notifications translations.
This topic does not have any threads posted yet!
You cannot post until you login.
Posted: August 10, 2017 at 5:50 am
As planned, the Tails project has announced the general availability of Tails 3.1. The developers are strongly encouraging users of older releases to upgrade as soon as possible because it closes several security vulnerabilities and upgrades the Tor Browser to the latest version based on the newest Firefox ESR.
The two major changes in Tails 3.1 are that the Tor Browser has been upgraded to 7.0.4 and the Linux kernel has been upgraded to 4.9.30-2+deb9u3. The new Tor Browser will be the main reason to upgrade, to make sure that bugs in the browser arent being exploited to remove the anonymity of the user. The final detail to note is that this release is based on the new Debian 9.1, which was released in July.
There are also a few problems which have been fixed in Tails 3.1, they are:
To get the new update, you can either do a clean install or do a manual upgrade. Both options have well-detailed instructions accompanied by screenshots making it easy to create your new Tails live USB. Unfortunately for existing users, the automatic upgrade from 3.0.1 to 3.1 has been disabled due to some issues, but Tails 3.0 users can jump directly to 3.1 with an automatic upgrade.
Tails 3.2 is scheduled for release on October 3, and version 3.3 will be out on November 14. While the team behind the OS seems to be good at meeting their deadlines, you should assume that the dates listed could change. To see where the project is headed over the coming years, feel free to give their roadmap a look.
Posted: at 5:50 am
CHINAS GREAT FIREWALL, a massive system of Internet filters and blocking, has long had a crack in it. The firewall prevents most users inside China from accessing platforms outside the country, such as Facebook, Google and Netflix, in keeping with Chinas desire to censor what can be seen and read. But popular software known as virtual private networks, or VPNs, permit a user inside China to tunnel through the firewall. Now the crack is being gradually cemented up.
A VPN has been particularly useful for foreign firms that come to China and want to link up with corporate networks outside it. Hoping to encourage such investment, China looked the other way for years at the existence of the VPNs, many available from Apples App Store in China. Some were easy to use just tap the button and a user would be on Facebook as if sitting in Los Angeles instead of Beijing. The VPNs are popular among millions of young people, as well as journalists and others.
China has been heading toward restricting them for some time, but now it is cracking down in earnest with a new cybersecurity law that carries criminal penalties. According to a BBC report, Apple informed more than 60 VPNs that they were being removed from the App Store in China on grounds that they were not licensed, although some others remain. Apples chief executive, Tim Cook, said last week we would obviously rather not remove the apps but Apple will follow the law wherever we do business. Likewise, a Chinese company that operates Amazons cloud-computing business in China has sent a notice reminding customers to comply with local laws and cease using software such as VPNs that could pierce the Great Firewall. (Amazon founder Jeffrey P. Bezos owns The Washington Post.) Apple, Amazon and other Western technology pioneers can have a positive influence on China, but the laws they obey can also become tools of censorship. Mr. Cook said this week that Apple has been engaging with China over this even when we disagree. But there is no evidence that Chinas leaders are prepared to loosen the reins of control. The trend is running the other way.
In Russia, no Great Firewall exists and major Internet platforms are accessible, but a government agency does blacklist specific sites. Now, President Vladimir Putin has signed legislation outlawing the use of VPNs and other methods that permit users to connect to the Internet anonymously, such as the Tor browser. Mr. Putin also signed legislation that will require instant-messaging services to establish the identity of users by their phone numbers another step to make sure no one escapes surveillance if the state deems it necessary.
In both Russia and China, the impulse is the same: Rulers fear the free flow of information.
Posted: August 9, 2017 at 4:50 am
Malware and hacking tools are established parts of the Federal Bureau of Investigation’s toolkit when it comes to unmasking criminal suspects on the Tor anonymity network. In a new case revolving around someone blackmailing children, FBI agents sent the suspect a digitally-poisoned movie file that obtained the target’s real IP address.
Though the FBI has used hacking techniques in a wide, controversial manner, the tactic used here highlights how the bureau can identify suspects in a much more targeted way too.
Monday, prosecutors announced charges against Buster Hernandez, 26, of Bakersfield, California. Hernandez is charged with threats to use an explosive device and sexual exploitation of a child. He is suspected of using the moniker “Brian Kil.”
Since 2015, Brian Kil has used social media, email, and VoIP to communicate with a number of underage female victims and extort sexual photos from them, according to the criminal complaint. Under duress, some victims sent explicit images and videos to Kil.
When Kil used sites like Facebook to harass victims, investigators found he was always hidden either behind an anonymous proxy or the Tor network, meaning authorities could not simply subpoena relevant companies for the suspect’s IP address.
“Your time is running out. You though [sic] the police would find me by now but they didn’t. They have no clue,” Kil wrote to one of the victims. As the harassment, threats, and publication of sexually explicit photos continued, law enforcement even held a community forum at Plainfield High School in January last year to discuss the case. Kil allegedly forced one of his victims to attend and report back, according to the complaint.
On June 9, Magistrate Judge Debra McVicker Lynch authorized the use of a Network Investigative Technique (NIT), an FBI blanket term for malware, exploits, and hacking tricks. The idea, the complaint adds, was to obtain Kil’s real IP address.
The complaint explains how the FBI’s tactic worked.
In this case, the FBI was authorized to add a small piece of extra code to a video file produced by one of the victims. Posing as the victim, the FBI then sent the booby-trapped file to Kil via Dropbox.
“Uploading now. Did you get it,” a message from the undercover FBI agent to Kil reads, according to text messages included in the complaint. (The video did not include any depictions of a minor engaged in sexually explicit activity, the complaint reads).
Judging by the complaint, the NIT was successful. “When Kil viewed the video containing the NIT on a computer the NIT disclosed the true IP address associated with the computer used by Kil,” the document adds.
Armed with the IP address, investigators then filed an emergency subpoena with the relevant internet service provider and were given a physical address. After intercepting communications to and from that IP address, investigators found someone viewed a photograph of the Columbine killers, according to the complaint. Kil, it turned out, had posted the same photo when he threatened the Plainfield School District in 2015. Physical surveillance showed that resident Buster Hernandez was always present when Tor was being used in the home.
Several recent cases have shown the FBI using hacking tricks in a targeted manner. In May, Forbes reported on an investigation in which the FBI used a similar technique but with Word documents rather than a video file.
These stand in stark contrast to the agency’s broader use of malware. Motherboard found the FBI used a Tor Browser exploit to hack over 8,000 computers in 120 different countries.
Although this latest case doesn’t highlight any vulnerabilities in the Tor network itself, it does act as a reminder that there are ways of deanonymizing people in a targeted way using novel or unorthodox law enforcement techniques.
See the original post:
The FBI Booby-Trapped a Video to Catch a Suspected Tor … – Motherboard