Skip to content

Month: July 2014

Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs

Next Blackhat promises to be  interesting: Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs. as Pierluigi Paganini, a renowned expert in Information Security says:   — I confess you to be very excited to see the presentation of the two experts, as they had anticipated, with a limited budget, it is possible to track users on Tor network, so let’s imagine the capabilities of  a persistent attacker with much more computational capability and with a “couple gigabit links”. — Indeed, that would be some news for the information security… Read more Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs

Email and its discontents – leap.se offers safety on user- and provider level

It is not so easy to find ones way in the post-Snowden times. A myriad of thoughts, some well thought through, some less are surfacing giving the user mostly security theater (© Bruce Schneier, I would say) and some half cooked good ideas. Now here is something, that is still in-between, but could develop into something useful, if done right. If a service provider is lavabitten to hand over their data, it is very hard to say “nay”!  Therefore, all the approaches that leave mail bits and pieces freely accessible… Read more Email and its discontents – leap.se offers safety on user- and provider level