Home » Tag Archives: users

Tag Archives: users

Research: Is illicit fentanyl desired by or imposed on opioid users?

Recently, illicitly produced fentanyl, and fentanyl analogues, have been rapidly emerging in countries all over the world. Fentanyl is usually disguised as heroin or prescription pills, which results in increased overdose mortality. This phenomenon can be explained by reduced expenses and risk to heroin sellers, heroin shortages, buyer preferences for rapid acting, strong opioids, and the increased popularity of darknet ... Read More »

WF.jpeg

Using Website Fingerprinting (WF) to deanonymize Tor users

The Tor network was established to provide anonymity to internet users who are concerned about preserving their anonymity when browsing specific online content. The Tor network is comprised of a set of router circuits that utilize cryptography to apply multiple layers of encryption to transmitted data packets, thus concealing the IP address of the user, the established connection between the ... Read More »

tor_network-clickstream.jpg

Clickstream tracking of users of the Tor browser – A research paper

The growing significance of web analytics, we have been witnessing throughout the past few years, has been also accompanied by an enormous growth in the number of web users concerned about preserving their online anonymity. The Tor browser has been often considered as the best online browsing tool available, as evidenced by more than 2.5 million people using it daily. ... Read More »

public internet tunnels.PNG

Research: Improving anonymity of users on I2P with an enhanced outproxy design

It is inarguable that the internet greatly undermines user privacy, and the risks are growing each day. This has fueled the development of several anonymity networks, such as Tor and the invisible Internet project (I2P). While the Tor network is currently the most commonly used solution for promoting anonymity and protecting a user’s privacy online, the low capabilities of I2P ... Read More »

Police Operation Targets Darknet Users in Italy

Italian law enforcement, yet again, made moves in an attempt to end criminal activity on the second iteration of the Italian Darknet Community. From the perspective of many of the users of the original Italian Darknet Community (IDC), the current marketplace and forum is no more than a law enforcement honeypot. Italian authorities have taken the hidden service down, raided ... Read More »

Amazon Patent to Help Unmask Bitcoin Users by Subscribing to “Data Stream”

Amazon, the world’s largest retailer, has a new patent that takes the unique authoritative opinion contrary to the decentralized pseudo-anonymous outlook for virtual currency—namely, bitcoin. The patent uses its data-stores to establish the active participants in bitcoin transactions so as to trade the said information on to a subscriber base, a crucial component that would be very useful in law ... Read More »

Snowden Documents Reveal the NSA Has Been Tracking Bitcoin Users Since at Least 2013

A series of documents recently published by The Intercept shows that the NSA has been tracking Bitcoin users for years. The documents were provided by NSA whistleblower Edward Snowden. While many other federal agencies are paying private contractors, such as Chainalysis, to provide information on Bitcoin transactions and users, the US intelligence community has been running their own cryptocurrency surveillance ... Read More »

Hotspot Shield VPN is Leaking Users Data and Location

A security researcher has found that one of the world’s largest Virtual Private Network (VPN) providers is leaking users private information. Hotspot Shield, which has been downloaded over half a billion times and has been in operation for over a decade, has a bug which can reveal what country a user is located in, as well as leak the name ... Read More »

An Overview of Darknet Drug Purchasing Activity Among Australian Drug Users

The Silk Road was by far the first cryptomarket, or darknet marketplace, to gain international recognition in 2011 as an online trading platform facilitating illicit drug trafficking. Since then, the number of darknet marketplaces have greatly increased, and even though a wide range of illegal products are offered on these online marketplaces (stolen credit/debit cards, weapons and counterfeited legal documents ... Read More »

Internet users will go to darknet In Russia

Since November 1, a law regulating usage of VPN services and anonymizers in Russia is in full force. For Internet users it has become more difficult to get out of any Russian censorship. “Novaya Gazeta” interviewed Artem Kozlyuk in order to find out how the new act works and how users “survive” in harsh circumstances. Kozlyuk is the head of ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

phisherdarkweb

Google Study Says Phishing Attacks Are the Biggest Threats to Web Users

A study by Google discovered that phishing attacks through fake emails were as effective as compared to data breaches that exposed usernames and passwords. Cyber criminals or cyber groups manage to steal over 25,000 valid sets of web credentials for Gmail accounts every week, painting a picture of the extent this problem has reached. Hackers are constantly searching for, and ... Read More »

μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users

Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the ... Read More »