Our National Encryption Debate, In Quotes

The long-burning debate concerning encryption, its impact on both consumer privacy and the government’s ability to protect its citizens is back with a vengeance. The dialogue appeared to be dwind

Tor Wars: The Signal Awakens

The long arm of the law wants ever more eyes, if you'll pardon the gruesome metaphor. The UK government recently unveiled an attempt to legalize "draconian state surveillance powers." US voices keep c

Homeland Security Shuts Down Library’s TOR Node Citing “Situational Awareness”

In a move that is sure to end well for the Department Of Homeland Security and the police in Lebanon, New Hampshire, officials have asked a New Hampshire public library to shut down its TOR node to pr

Tor Users Must Now Provide A Phone Number To Open A New Twitter Account

Twitter last week announced plans to begin tracking troublesome users via their mobile phone number. Along those lines, it has begun forcing users of anonymous web browser Tor to provide a number in o

The Anonymity Network At Risk

You don’t have to watch NCIS to know that almost everything we do leaves some kind of trail or trace. Every click of the Internet and every post we make, email we send and file we download are all b

[Updated] Anonabox Delivers Plug-And-Play Privacy For All Your Web Traffic

Anonabox is an open source plug and play hardware router designed to encrypt and route all the users' web traffic via the Tor anonymizing network, so their browsing and location remains private. No ad

The Feds Found The Silk Road’s Ross Ulbricht Thanks To A Leaky CAPTCHA

You may have heard that the infamous Dread Pirate Robets AKA Ross Ulbricht’s Silk Road was taken down thanks to a problem in his anonymous Tor server. Now, however, Brian Krebs has shown us just

Tor Exec Claims NSA Agents Supply It With Vulnerability Information

The Tor Project, an effort to allow users to browse the Internet anonymously, thinks that it is receiving tips from spies focused on finding its flaws. Tor's Andrew Lewman alleges that the folks taske

iCloak Stik Aims To Put Robust Online Privacy In The Hands Of The Many, Not The Few

Meet iCloak Stik: a plug and play device that's being designed to make robust online privacy accessible to the many not the few -- by enabling an average computer user to route their browsing via the

Encrypted To The Last Drop

Everything is for sale in the dark web marketplaces. Anonymous buyers can procure everything from prescription painkillers to exotic designer drugs. You can hire sex workers and buy weapons in the sam

The oRouter Is A Tor-Powered Linux Box That Secures Your Internet Connection

Longtime TechCrunch Disrupt NY hackathon participants, Kay Anar and Gilad Shai showed off their hardware hack today called the "oRouter" - a Linux-powered, Raspberry Pi-like computer offering secure W

After Silk Road

The Internet routes around damage. With the fall of the Silk Road there comes the inevitable expectation that the underbelly of the Internet is somehow cut and something important has been removed lik

The NSA Can Read Some Encrypted Tor Traffic

Security expert <a target="_blank" href="">Robert Graham</a> has done a bit of research and posts that the encryp

The Pirate Bay Celebrates Its 10th Birthday By Launching A Tor-Based Anti-Censorship Browser

The Pirate Bay (TPB), the torrent site that really doesn't need an introduction anymore, celebrates <a target="_blank" href="">its 10th birthday</a> today.

Worried Who’s Watching Your Web Browsing? Adafruit’s Onion Pi Tor Proxy Project Creates A Private, Portable Wi-Fi Access Point

Adafruit Industries has put together a weekend project for people worried the NSA is monitoring how many reruns of Seinfeld they watch on their tablet. The Onion Pi Tor Proxy is a weekend project that

Onion Browser: A Mobile Browser For The Truly Paranoid

If, for whatever reason, you need to cover your tracks while you are browsing the web on your desktop, you have plenty of options to keep anonymous. Thanks to <a href="

Palin e-mail hacker traced to University of Tennessee dorm

The very fabric of our democracy came under attack last week when a hacker broke into Republican vice-presidential nominee Sarah Palin’s e-mail account. Federal investigators have since been inv