BTC $62872.5802
ETH $2542.1690
BNB $567.1465
SOL $146.8376
XRP $0.5832
stETH $2541.5194
DOGE $0.1046
TON $5.5980
TRX $0.1520
ADA $0.3519
AVAX $27.1416
wstETH $2998.7873
WBTC $62860.9352
WETH $2545.1266
LINK $11.4382
BCH $335.3709
DOT $4.2809
UNI $6.7392
DAI $0.9994
LTC $64.8816
KAS $0.1690
FET $1.6105
SUI $1.4951
BSC-USD $1.0002
ICP $8.3975
APT $7.2764
PEPE $0.0000
CAKE $1.8405
XMR $176.9786
IMX $1.5709
TAO $409.6685
POL $0.3984
ETC $18.9219
USDE $0.9986
NEAR $4.3604
STX $1.7593
FDUSD $0.9990
OKB $39.0418
AAVE $153.2829
FIL $3.7348
INJ $20.7165
MNT $0.6038
XLM $0.0956
HBAR $0.0518
VET $0.0235
ENS $18.2015
WIF $1.7700
BTC $62872.5802
ETH $2542.1690
BNB $567.1465
SOL $146.8376
XRP $0.5832
stETH $2541.5194
DOGE $0.1046
TON $5.5980
TRX $0.1520
ADA $0.3519
AVAX $27.1416
wstETH $2998.7873
WBTC $62860.9352
WETH $2545.1266
LINK $11.4382
BCH $335.3709
DOT $4.2809
UNI $6.7392
DAI $0.9994
LTC $64.8816
KAS $0.1690
FET $1.6105
SUI $1.4951
BSC-USD $1.0002
ICP $8.3975
APT $7.2764
PEPE $0.0000
CAKE $1.8405
XMR $176.9786
IMX $1.5709
TAO $409.6685
POL $0.3984
ETC $18.9219
USDE $0.9986
NEAR $4.3604
STX $1.7593
FDUSD $0.9990
OKB $39.0418
AAVE $153.2829
FIL $3.7348
INJ $20.7165
MNT $0.6038
XLM $0.0956
HBAR $0.0518
VET $0.0235
ENS $18.2015
WIF $1.7700
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      How do you search in the TOR network?

      In an age where online privacy and digital security have become paramount, the TOR (The Onion Router) network stands as a bastion of anonymity, offering a refuge for those seeking to navigate the web with their identities shielded from prying eyes. While many know TOR's ability to conceal one's onli...

    • Cybersecurity

      The FBI and CISA have issued recommendations for countering the AvosLocker ransomware

      A tried-and-true attack plan was discovered by experts and disseminated to all organizations. The Federal Bureau of Investigation (FBI) and the US Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement that added new details about the tools that attackers using the AvosL...

    • Cybersecurity

      How to Create a Temporary Mailbox: Protecting Your Online Privacy

      Online privacy and security have become paramount concerns in today's digital age. With the constant threat of spam, phishing attempts, and data breaches, it's essential to take proactive measures to protect your personal information. One effective way to safeguard your online presence is by using t...

    • Cybersecurity

      Webwyrm network: how Chinese scammers robbed thousands of unemployed people

      The applicants paid a price for their naivete in work, money, and time. An international criminal network that is allegedly connected to China has been discovered by cybersecurity firm CloudSEK. Scammers in this network profit from the gullibility of job seekers all over the world. More than 100,00...

    • Cybersecurity

      Android Trojan “GoldDigger” is rapidly emptying the wallets of Vietnamese users

      No SMS can evade a sophisticated digital thief.   "GoldDigger" is the name of a new Android Trojan that targets banking apps, according to security researchers. Its objective is to attack financial applications in order to steal money from victims and give infected devices remote access. The...

    • Cybersecurity

      Google turns Chrome into a tool for widespread surveillance.

      Here is why the EFF is unhappy. To hide their online habits, users should disable several Privacy Sandbox settings in Google Chrome, or they should think about switching to Mozilla Firefox or Apple Safari, according to the Electronic Frontier Foundation (EFF). Chrome's Privacy Sandbox is neither s...