BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      A major cloud provider has been cyberattacked due to a bug in the Linux kernel

      The Spectre vulnerability makes itself felt even years later. Yesterday, Eduardo Vela Nava of the Google Product Security Response Team reported a new vulnerability in the Linux 6.2 kernel related to how the Spectre vulnerability works. On December 31, 2022, the medium security flaw was reported pr...

    • Cybersecurity

      Impala Stealer: another cryptocurrency thief has reached the developers, this time through the NuGet platform

      How secure are public software repositories in general? Cybersecurity researchers recently discovered cryptocurrency-stealing malware that was distributed through the NuGet developer platform disguised as 13 fake packages. The sophisticated typesquatting campaign, described in detail by JFrog expe...

    • Cybersecurity

      A new browser from Tor and Mullvad has appeared with increased privacy without the Tor network

      The Tor team and VPN provider Mullvad have jointly launched Mullvad Browser, a web browser focused on protecting user privacy. Technically based on the Firefox engine, Mullvad Browser incorporates most of the changes from the Tor Browser, but does not use the Tor network by making requests directly...

    • Cybersecurity

      New malware from Chinese hackers targeting Linux servers

      Security firm ExaTrack says an unknown Chinese-sponsored hacker group is using new malware to attack Linux servers. ExaTrack experts found samples of malware documented in early 2022, dubbed Mélofée. One of the samples is designed to deliver a kernel-mode rootkit based on the open-so...

    • Cybersecurity

      Two-factor authentication and possible ways to bypass it

      We consider in detail the advantages and disadvantages of the most popular way to protect accounts on the Internet. Account security best practices include two-factor authentication (2FA). It is used everywhere for both corporate and personal user accounts around the world. In the classical sense,...

    • Cybersecurity

      Vulnerability in the underlying Wi-Fi protocol allows attackers to intercept network traffic

      Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 Wi-Fi protocol standard, introduced back in 1997. Vulnerability CVE-2022-47522 allows attackers to trick access points into transmitting so-called "network frames" in unencrypted form, available fo...