-
Bitcoin transactions: traceable or not?
Bitcoin: most safe way to transact? A lot of people think that Bitcoin transactions are complex and untraceable. But in fact, Bitcoin can be called a transparent currency. All Bitcoin transactions are public, anyone can review them. But only transactions are traceable, not persons who made that transactions. Typical Bitcoin transaction looks like this: one person sends coin to another person, from one adress to another. After that the sender and the receiver’s addresses, the time/date of the transaction and the amount of Bitcoin sent/received will be permanently stored for all Bitcoin transaction ever made,...
-
Google vs DuckDuckGo | Pros & Cons and why you should switch
You've all probably seen the popular instant answer feature on Google search. You might now know that it was copied from DuckDuckGo. Today we're going to explain why it is dangerous to use Google search and why Gabriel Weinberg, DuckDuckGO CEO, is proud that his search engine does not track Internet users.Disclaimer! The author doesn't take the responsibility about methods written below. This article is made only for information puproses! Do at your own peril and risk!The Propaganda EngineSearch engines are your second gatekeepers to the internet right after ISPs [Internet Service Providers]. That is...
-
More than Three Million CoinMarketCap Email Addresses are Currently Being Traded on Darknet Forums
Millions of email addresses associated with crypto marketplace data website CoinMarketCap (CMC) have reportedly been compromised.According to the data hacking website Haveibeenpwned, 3.1 million addresses are currently being traded on darknet forums.CMC said that it became aware that batches of the data were being displayed online, "assuming a list of user accounts." It is unclear how the addresses were obtained. A Web site owned by leading global cryptocurrency exchange Binance also said only addresses, not passwords, were disclosed, though it found a "correlation" and warned users about using separate and unique passwords on multiple sites."At...
-
Hacker group accused of DDoS attacks on UK telecom operators
A group of cybercriminals conducted a massive attack on Britain's telecommunications networks. The scale of the attack has been called "unprecedented before" in history since its inception in 2004, according to The Daily Swig news. The hacker group's attacks represent an assault on Comms Council UK: the U.K.'s critical telecommunications structure. This company provides services to the police, NHS and other public resources. South Korean telecommunications company KT was also affected. The attack caused a broadcast blackout that lasted about 40 minutes. A large number of Voice over Internet Protocol (VoIP) providers were affected by...
-
The Personal Data of All Argentine Citizens is for Sale on the Darknet
Argentina suffered a large-scale data leak - The National Registry of Persons was put up for sale on the darknet. The National Registry of Persons is a government database containing information about each citizen's national identity card. In addition to images of all national IDs issued by the government, the information printed on the ID can be found there. As proof, an unknown hacker posted pictures of identity cards and personal data of several dozen Argentine celebrities to the public, and offered to find any citizen of the country, for a fee.The National Registry of...
-
Briar messenger: main features
Briar is just one of many new privacy-focused messengers, which offers connectivity via Bluetooth, WiFi and Tor. But is it secure enough and easy to use to catch on?Even if the internet is down, Briar can serve as a functional communication platform. This can be useful in remote areas or in cases when the Internet may be unavailable or insecure due to government interference.Since the application is open source, its code was scrutinized by several security organizations prior to the initial release of the messenger. The results were very encouraging.Benefits of the messengerThere are several...
-
Alternatives to Android
Android appeals to many people, partly because of its flexibility and the possibility of comprehensive customization. However, this is also its disadvantage, with great freedom comes great responsibility. The pre-installed builds on mass-market phones represent a tandem between the manufacturer and Google and both are trying to collect as much information about their consumer as possible. What Kind of Information is Collected?Specified at registration and collected during the use of the device. And even if a fictitious date of birth is specified, an alternate opinion may be stored based on the findings of the AI.Information...
-
Ukrainian police exposed hackers who laundered tens of millions of dollars in Darknet
Ukrainian law enforcers and U.S. intelligence agencies exposed Ukrainians who were engaged in "laundering" money for international hackers in Darknet and legalized tens of millions of dollars, the Ukrainian National Police (NPU) said in a press release on Monday."To withdraw money from the "shadow", the attackers organized a large-scale scheme. They hid under different nicknames in the Darknet, had many fictitious persons, as well as worked through various financial services."The clients of the criminals involved were hackers engaged in cyber theft and wishing to turn stolen goods into cash. Among them were hacker groups operating...
-
Experts told about the cost of hackers on the darknet
Cybersecurity experts from Comparitech conducted an analysis of hacking services offered on the darknet. As the experts found out, illegal hackers can be hired to hack into social media accounts, write off debts and even change student grades.While prices give customers an idea of how much the service will cost, most offers are actually negotiated directly with customers. The complexity, duration, risk and scope of work determine the final price.Professionals have noted some trends in service listings:Personal attacks — such as defamation, legal sabotage and financial hardship are the most expensive services.Hacking into social media...
-
Europol Arrests 150 Darknet Vendors
In January, Europol managed to shut down DarkMarket, a major darknet marketplace for drug trafficking. As it turned out, it didn't stop there and now investigators have arrested 150 "high-value" targets who previously worked on the closed marketplace.A person with knowledge of the operation told reporters that 150 suspects involved in the sale of illegal goods on the Internet were arrested as part of a major Europol investigation around the world.The operation targeted vendors who operated on the DarkMarket website, which was blocked by police in January, the insider told.The insiders also reported that the...