Hackers are notoriously clever at committing crimes. Of all the criminal archetypes, they seem to be the most creative; so creative that we were forced to invent yet another word to describe their latest scams. Malvertising — a new shorthand for malicious advertising — is something very different from the traditional methods hackers have historically used.
Have you ever wanted to contribute to the Tor project, but never knew how to do it? Why not running a Tor relay? The more people running relays, the faster the Tor network will be.
This short guide from the recent CryptoParty workshop helps you with launching a virtual machine and configuring it as a Tor relay.
The information sources of journalists are under constant threat in the age of digital surveillance. Although the confidentiality of information sources is protected by law, secret FISA courts, questionable policing practices and dictatorships regularly circumvent these regulations. To keep investigative articles coming, privacy enthusiasts in Sydney have teamed up to launch ‘Privacy for Journalists’, a website full of practical technology guides for the journalist community.
Reporters are one of the bastions of democracy, as they could expose the wrongdoings of governments, corporates or well-connected individuals affecting the many.
With the legal protections shrinking and the technical disparity widening, the protection of information sources is more challenging than ever.
Information security experts launch website and community to help investigative journalists protect their information sources.