BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      How hackers use Tor to steal crypto

      A team of researchers from Kaspersky Lab has revealed a new campaign aimed at stealing cryptocurrencies. According to the company, cybercriminals use the CryptoClipper Trojan, which is distributed on third-party Internet resources under the guise of the Tor browser. When it enters the system, the pr...

    • Cybersecurity

      how did Telegram become the new cyber scam den?

      Now everyone can become a hacker, ordinary Internet users should be even more vigilant! Kaspersky Lab recently noted a new trend in the phishing cybercrime business. According to researchers, the Telegram messenger has recently become much more often used by hackers and other intruders to sell and...

    • Drugs

      What is the difference between MDA and MDMA?

      Perhaps you have ever wondered what is the difference between MDMA and MDA. To begin with, MDMA has virtually no hallucinogenic properties. MDA, on the contrary, gives good visual hallucinations. The duration of action for MDA is up to 8 hours, and for MDMA it is up to 3-4 hours. Regarding talkati...

    • Cybersecurity

      Critical vulnerability in ChatGPT allows hackers to take over someone else's account

      The OpenAI team has fixed a critical ChatGPT vulnerability that allows hackers to take over someone else's account, view chat history and access payment information. The mistake was reported to the company by Nagli bughunter and provided a video demonstration. The researcher managed to carry out a...

    • Cybersecurity

      New cryptostealer Rilide shamelessly robs users of Chromium browsers

      The principle of the malware is very similar to CryptoClipper, recently discovered by Kaspersky Lab. Chromium-based web browsers have fallen victim to a new malware called Rilide. The malware disguises itself as a legitimate Google Drive extension and allows attackers to perform a wide range of mal...

    • Cybersecurity

      REF2924 hackers change tactics and move to permanent access to the network

      Security researchers from Elastic Security Labs found that the REF2924 faction has moved from spying to permanent access inside targeted networks. Recently, hackers have added a new backdoor called NAPLISTENER to their arsenal. According to a report from Elastic Security Labs, REF2924 targets sites...