Mit „tor“ getaggte Nachrichten, Seite 7
-
tor-browser-bundle 3.6.6 out (with #Tor v0.2.4.24 and security fixes) https://blog.torproject.org/blog/tor-browser-366-released
-
tor-browser-bundle 3.6.6 out (with #Tor v0.2.4.24 and security fixes) https://blog.torproject.org/blog/tor-browser-366-released
-
My #Tor workshop at !SFD was well received. Had requests to do a #TAILS workshop; let's recruit @KWCrypto members to hold a !Cryptoparty
-
My presentation notes for " !Privacy and !Security Tools: #Tor Browser" are up: http://sobac.com/sfd/2014/Workshop on Privacy and Security Tools/ !SFD
-
That's why I'm using #Orweb with #Tor: #Android browser bug could be a "#privacy disaster" http://ur1.ca/i7jtk
-
That's why I'm using #Orweb with #Tor: #Android browser bug could be a "#privacy disaster" http://ur1.ca/i7jtk
-
Nick Guenther and I are demonstrating #TOR at the !Privacy and !Security Tools workshop at !SFD on Saturday http://kwlug.org/sfd
-
IP-Verschleierung soll zur Straftat werden http://www.unwatched.org/20140911_IP-Verschleierung_soll_z…
-
IP-Verschleierung soll zur Straftat werden http://www.unwatched.org/20140911_IP-Verschleierung_soll_z…
-
@jensw wenn du's noch nerdiger willst: die Instanz indy.im ist auch über eine Onion-URL zu erreichen :-) #Tor #HiddenService !darknet
-
This made me decide to use #Tor at last: https://youtu.be/rSIW9GpoYZo?t=49m04s “The NSA mass surveillance doesn’t scale.”
Friday, 05-Sep-14 17:58:05 UTC von web -
#Tor on the other hand is a dilemma for the secret service: Provide others the means to escape surveillance to get the ability to play dirty
-
#Tor is the wet dream of every secret service: Use human rights activists to mask their attacks. See http://pando.com/2014/07/16/tor-spooks/
-
I stopped reading about halfway through because it was all speculation and conjecture lacking any evidence at all http://miniver.blogspot.co.uk/2014/07/how-secure-is-tor.html #TOR !Crypto !surveillance
-
I read this yesterday, and I've been thinking about it. Nothing new for those of us who've been following #TOR for some time. But I'm a little surprised at the glibness the article attributes to Roger Dingledine http://pando.com/2014/07/16/tor-spooks/ !crypto !surveillance
-
#Tor security advisory: "relay early" traffic confirmation attack https://t.co/iqPU6M1wQd !anonymity !security
-
#Tor security advisory: "relay early" traffic confirmation attack https://t.co/iqPU6M1wQd !anonymity !security
-
removed: talk about #de-anonymizing #Tor (at #BlackHat conference), "canceled at request of #lawyers for CMU, where the speakers work as researchers" http://tux.so/journal:2014:07:21:the_talk_about_de-anonymizing_tor_at_the_blackhat_conference_has_been_removed cc @question
-
removed: talk about #de-anonymizing #Tor (at #BlackHat conference), "canceled at request of #lawyers for CMU, where the speakers work as researchers" http://tux.so/journal:2014:07:21:the_talk_about_de-anonymizing_tor_at_the_blackhat_conference_has_been_removed cc @question