BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      How do you search in the TOR network?

      In an age where online privacy and digital security have become paramount, the TOR (The Onion Router) network stands as a bastion of anonymity, offering a refuge for those seeking to navigate the web with their identities shielded from prying eyes. While many know TOR's ability to conceal one's onli...

    • Cybersecurity

      The FBI and CISA have issued recommendations for countering the AvosLocker ransomware

      A tried-and-true attack plan was discovered by experts and disseminated to all organizations. The Federal Bureau of Investigation (FBI) and the US Cybersecurity and Infrastructure Security Agency (CISA) released a joint statement that added new details about the tools that attackers using the AvosL...

    • Cybersecurity

      How to Create a Temporary Mailbox: Protecting Your Online Privacy

      Online privacy and security have become paramount concerns in today's digital age. With the constant threat of spam, phishing attempts, and data breaches, it's essential to take proactive measures to protect your personal information. One effective way to safeguard your online presence is by using t...

    • Cybersecurity

      Webwyrm network: how Chinese scammers robbed thousands of unemployed people

      The applicants paid a price for their naivete in work, money, and time. An international criminal network that is allegedly connected to China has been discovered by cybersecurity firm CloudSEK. Scammers in this network profit from the gullibility of job seekers all over the world. More than 100,00...

    • Cybersecurity

      Android Trojan “GoldDigger” is rapidly emptying the wallets of Vietnamese users

      No SMS can evade a sophisticated digital thief.   "GoldDigger" is the name of a new Android Trojan that targets banking apps, according to security researchers. Its objective is to attack financial applications in order to steal money from victims and give infected devices remote access. The...

    • Cybersecurity

      Google turns Chrome into a tool for widespread surveillance.

      Here is why the EFF is unhappy. To hide their online habits, users should disable several Privacy Sandbox settings in Google Chrome, or they should think about switching to Mozilla Firefox or Apple Safari, according to the Electronic Frontier Foundation (EFF). Chrome's Privacy Sandbox is neither s...