Home » Articles

Articles

Reasons why Bitcoin crimes has reduced when compared to the previous year

The relevance of cryptocurrency in the world economy is increasing and many believe that bitcoin and crime go hand-in-hand because blockchain technology does not need any formal registration before one could create an account. However, it could be noted that an official of the US Drug Enforcement Agency had last month said that cryptocurrency crimes dropped by 80% with bitcoin contributing only 10% of such crimes presently, irrespective of its large volume of trades and holders. This could be seen by the publication on cointelegraph that US DEA crypto crimes dropped by 80%. Here are several reasons that Bitcoin crimes are reducing tremendously: There ... Read More »

Interview with a Professional DDoS Extortionist

– Who are you and what do you do? My name obviously cannot be mentioned for obvious reasons, but I am a male between the ages of 25-35, living in Australia who enjoys extorting ponzi scheme websites in the crypto niche, BTC casinos, ICO’s and any other relevant cryptocurrency generating business that solely relies upon their website being online for ... Read More »

Monero Vs Zcash: The Duel for Both Privacy and Anonymity

Bitcoin has in the recent past been the preferred medium of exchange on the dark web. However, many cryptocurrencies have popped up for users to choose what is best and that which suits their needs and the nature of their transactions. Bitcoin provided higher anonymity than the fiat currencies and now other crypto coins provide much higher anonymity than it. ... Read More »

Tor anonymizers.jpg

The Onion Report: The Tor Project at HOPE

Every two years the Hackers On Planet Earth (HOPE) conference is held at the Hotel Pennsylvania in New York City. The Tor Project has held a panel discussion on the state of the Tor Project at each HOPE called The Onion Report, during which the new developments at the Tor Project are discussed. At this year’s HOPE, The Onion Report ... Read More »

Рharmacokinetics of mephedrone

Written translated and contributed by  Hydra market. Mephedrone belongs to synthetic cathinones and is one of the most widespread SAS in the Russian Federation and in the world as a whole nowadays. The volumes of its trafficking are comparable to the volumes of trafficking in amphetamine and more recently they surpass them, according to the different specialists` research. The forum ... Read More »

How To Torrent Pharmaceutical Drugs

At the recent Hackers On Planet Earth (HOPE) conference, Dr. Michael S. Laufer the chief spokesman for the biohacker collective known as the Four Thieves Vinegar Collective, gave his second presentation at the hacker conference. Laufer is a doctor of mathematics, not a doctor of medicine, but he works on a project that could change how people can get access ... Read More »

Shutting down social engineering attempts on you!

In my last article I talked about how you can use social engineering for your benefit. But the reverse is true too, someone can use social engineering on you, to their benefit, with you in the dark. In fact, odds are good that at one point someone has attempted to use social engineering techniques on you. In bad situations, this ... Read More »

What is Social Engineering?

Social Engineering is a scam artist’s best trick. It’s pretty much as it sounds, you engineer society in order to do things you shouldn’t. A few common examples would be wearing a safety vest and hardhat to sneak onto construction sites for urban exploration, wearing a lanyard and carrying a clipboard to get backstage of a concert without being asked ... Read More »

CRYPTO LAUNDERING IN THE EYES OF THE LAW

Money laundering. There are many definitions involving terms like criminal proceeds, illegal/illicit, processing, disguise, concealment, true nature and ownership. Some even describe it as a three stage process: placement, layering and integration. Most people who get convicted on money laundering charges are not even aware of different phases of things they did. They merely tried to make dirty money look ... Read More »

Eavesdropping On Tor Exit Nodes

In the last article, I talked about the appropriate configuration of the Tor browser and the steps to follow to further strengthen our privacy. Now, we’ll see how it is possible to have our data leaked even if our Tor browser is working in the right manner. The first thing to point out, is that Tor encrypts our communication only ... Read More »

Tor anonymizers.jpg

How To Configure Tor Properly

Tor is a renowned must in the anonymity field, and the first fundamental step in your fight for privacy. You could think that the only thing that you need to hide your identity while surfing the web is to download the Tor browser bundle, but this is not enough. There are, in fact, wrong behaviours that can reveal your real ... Read More »

How To Test Your Website’s Security With An Intercepting Proxy

We all know cybersecurity threats grow each day and, in these times of increasing danger, it is of great importance to test your website’s security before burglars do. While even the most dull-witted system administrator is able to run a scan with Nmap or Nessus (though he could ignore the myriad of options these scanners offer), it results slightly more ... Read More »

Business from the inside out: Dropper

Who are droppers? If you need to cash an ATM card or withdraw money from a bank account you cannot do without a dropper. It is surely possible to hire a newbie, who knows nothing about responsibilities and the specificity of this activity. In this case you can pay him a penny but you can run into problems. The thing ... Read More »

How does a state spy on citizens?

On the air of radio station “Echo Moscow”, Gennady Gudkov, the colonel of the Federal Security Service of Russia shared his ideas on how a state spies upon its citizens. Laboratory Kaspersky recently published a report about finding a large server grouping which might be connected with the National Security Agency of the USA. This grouping implemented software tracking tools ... Read More »

Anonymous Postal & Delivery Services – Could it work?

With Darknet Market use growing, there is an increasing amount of deliveries being seized. Is there potential for an anonymous postal service in which orders get delivered under the radar, or is it just not possible? The deep web is often used as a means of anonymously ordering goods – normally anything other than what you’d call legal. With this ... Read More »