To preserve security of network, Tor Project rejects hundreds of unpatched relays. Sean, or someone who knows more than me about Tor (i.e. 99% of you): does this mean that if the NSA knew about ...
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections. Unlike classic methods like torsocks, which rely ...
19 Tor exit relays used self-signed certificates to launch man-in-the-middle attacks against HTTPS and SSH connections Computer scientists found almost 20 exit relays in the Tor anonymity network that ...
German news outlets reported that police were able to de-identify a Tor user involved in a child sexual abuse network, but the Tor Project says the techniques used appear to rely on an outdated Tor ...
The Tor project said it could face attempts to incapacitate its network in the next few days through the seizure of specialized servers. The project did not name the group or agency that may try to ...
Identifying users who access Tor hidden services—websites that are only accessible inside the Tor anonymity network—is easier than de-anonymizing users who use Tor to access regular Internet websites.