-
Briar messenger: main features
Briar is just one of many new privacy-focused messengers, which offers connectivity via Bluetooth, WiFi and Tor. But is it secure enough and easy to use to catch on?Even if the internet is down, Briar can serve as a functional communication platform. This can be useful in remote areas or in cases when the Internet may be unavailable or insecure due to government interference.Since the application is open source, its code was scrutinized by several security organizations prior to the initial release of the messenger. The results were very encouraging.Benefits of the messengerThere are several...
-
Alternatives to Android
Android appeals to many people, partly because of its flexibility and the possibility of comprehensive customization. However, this is also its disadvantage, with great freedom comes great responsibility. The pre-installed builds on mass-market phones represent a tandem between the manufacturer and Google and both are trying to collect as much information about their consumer as possible. What Kind of Information is Collected?Specified at registration and collected during the use of the device. And even if a fictitious date of birth is specified, an alternate opinion may be stored based on the findings of the AI.Information...
-
Ukrainian police exposed hackers who laundered tens of millions of dollars in Darknet
Ukrainian law enforcers and U.S. intelligence agencies exposed Ukrainians who were engaged in "laundering" money for international hackers in Darknet and legalized tens of millions of dollars, the Ukrainian National Police (NPU) said in a press release on Monday."To withdraw money from the "shadow", the attackers organized a large-scale scheme. They hid under different nicknames in the Darknet, had many fictitious persons, as well as worked through various financial services."The clients of the criminals involved were hackers engaged in cyber theft and wishing to turn stolen goods into cash. Among them were hacker groups operating...
-
Experts told about the cost of hackers on the darknet
Cybersecurity experts from Comparitech conducted an analysis of hacking services offered on the darknet. As the experts found out, illegal hackers can be hired to hack into social media accounts, write off debts and even change student grades.While prices give customers an idea of how much the service will cost, most offers are actually negotiated directly with customers. The complexity, duration, risk and scope of work determine the final price.Professionals have noted some trends in service listings:Personal attacks — such as defamation, legal sabotage and financial hardship are the most expensive services.Hacking into social media...
-
Europol Arrests 150 Darknet Vendors
In January, Europol managed to shut down DarkMarket, a major darknet marketplace for drug trafficking. As it turned out, it didn't stop there and now investigators have arrested 150 "high-value" targets who previously worked on the closed marketplace.A person with knowledge of the operation told reporters that 150 suspects involved in the sale of illegal goods on the Internet were arrested as part of a major Europol investigation around the world.The operation targeted vendors who operated on the DarkMarket website, which was blocked by police in January, the insider told.The insiders also reported that the...
-
Telegram Becomes Alternative to Darknet for Cybercriminals
Telegram has become an alternative to Darknet for cybercriminals - the messenger found a growing network of traffickers of stolen data in the channels with thousands of subscribers.This is stated in an investigation by the Financial Times, conducted in conjunction with the Cyberint company.The newspaper writes that the investigation uncovered a network of hackers sharing leaked data, sometimes through channels with tens of thousands of subscribers, and in many cases the content offered resembles that sold on the darknet.According to Cyberint analyst Tal Samro, Cyberint has recently recorded an increase in cybercriminal activity on Telegram...
-
How to use the Tor Browser tools to protect your privacy
When searching for information on the Internet, using various online services and logging into various sites, many users want to remain anonymous. Therefore, many people today prefer the Tor browser, with the help of which you can enter the dark web and remain confidential. However, not everyone knows how to properly use the Tor browser and all the tools that this multifunctional software offers.Tor stands for The Onion Routing, which fully describes how this open source browser anonymizes its users. As explained on the Tor Project website, it does this by encrypting user information and...
-
Bulletproof Hosting employees jailed for supporting cyberattacks
Two Bulletproof Hosting employees are accused of being involved in spreading malware and cyberattacks on U.S. financial institutions that resulted in millions of dollars in losses, according to an official press release from the U.S. Department of Justice.The FBI-led investigation involved law enforcement agencies in Germany, Estonia and the United Kingdom. Lithuanian national Aleksandr Skorodumov, 33, and Estonian citizen Pavel Stassi, 30, were given 48-month and 24-month jail terms respectively over their roles in a criminal group that ran cybercrime infrastructure over a six-year period. The organization’s 34-year-old Russian co-founders, Aleksandr Grichishkin and Andrei Skvortsov,...
-
Darknet And Dark Web: What Is It
Darknet (dark web): what is it? Term “Darknet” was coined during Cold War to refer to computer networks that were isolated from the ARPANET (U.S. military network, prototype of the internet) for security reasons. These networks were inaccessible and invisible in network lists. In 2000s, the term became popular after the publication of the paper “The Darknet and the Future of Content Distribution” in 2002. In this paper, four Microsoft employees argued that the darknet is the primary threat to the legal distribution of digital content because of it’s total anonymity and absence of control....
-
OnionShare Quick Guide
With the open source software OnionShare, you can send and receive files, chat anonymously or host sites, and everything inside the Tor network. OnionShare runs locally on the user's computer and makes its services available to others through Onion Services. OnionShare web addresses are protected with a random password by default.There is no way for a third party to get access to everything that happens inside OnionShare, since the user's computer itself is the web server. Actually, even the developers of this program themselves do not have such an opportunity. In addition, user anonymity is...