BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Cybersecurity

      In the United States, losses from Internet fraud reached a record $10 billion in 2022

      The Federal Bureau of Investigation released its annual Internet Crime Report. The US Federal Bureau of Investigation published its annual Internet Crime Report, which shows that in 2022, losses from Internet fraud reached a five-year high and amounted to more than $10 billion. The figure is $3 bil...

    • Cybersecurity

      Emotet malware returns after a three-month hiatus

      The Emotet malware campaign continues after a lull of 3 months. Malicious emails began to reach people all over the world. Emotet is a known malware distributed via email. It is delivered to the target computer via malicious Microsoft Word and Excel attachments. When users open these documents and...

    • Cybersecurity

      Mustang Panda hackers use a freshly built backdor to advanced evasion of detection

      The Chinese hacker group Mustang Panda, engaged in cyberspiospionage, was seen in the deployment of a new user backdor called MQsTTang. Mustang Panda is a group of attackers aimed at companies in various fields around the world. In their attacks, primarily aimed at the theft of information, cybercr...

    • Cybersecurity

      What are cookies, how they work and why they are needed?

      A quick guide to managing your online privacy. The word "cookie" is translated from English as "cookies". However, we will not talk about flour confectionery products in this article. Cookies are widely used on websites and are an essential component of today's Internet. They are very useful in ma...

    • Cybersecurity

      UK vows to stop Chinese cyber espionage

      To do this, the country had to create a new advisory agency designed to reduce the number of leaks of intellectual property. Britain's domestic intelligence service MI5 will oversee a new agency tasked with helping local organizations fight Chinese cyber spies and other threats. British Prime Mini...

    • Drugs

      Stimulant without addiction

      Ephedrine is once the most popular stimulant and fat burner. It was used in the past - in sports and medicine. Some people began to make amphetamines from ephedrine, as a result of which its sales had to be limited, and in some countries banned completely. This substance came to us from Chine...