Tags: karmaRemove, torRemove

Accused Silk Road owner claims to be 'fall guy' for operators 
Jan 14, 2015 | Comment Now 
First day of trial gets underway.
The crypto protocols even the NSA can’t crack 
By Paris Cowan | Dec 29, 2014 | Comment Now 
Latest document dump reveals cyber-spy hit-list.
Biggest ever Tor raid sees 16 arrested 
Nov 10, 2014 | Comment Now 
Underground sites targeted.
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
Credit card -stealing trojan 'offers better protection than Tor' 
By Adam Greenberg | Nov 22, 2013 | Comment Now 
i2Ninja sold on a Russian cyber crime forum.
FBI Tor server takeover leads to arrest 
By Adam Greenberg | Sep 17, 2013 | Comment Now 
Irishman charged with distributing child pornography.
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
Claims Tor malware linked NSA 
By Adam Greenberg | Aug 6, 2013 | Comment Now 
IP space traced.
Facebook blocked Tor 
By Dan Kaplan | Jun 19, 2013 | Comment Now 
Malicious activity tripped site integrity systems.
Ballot-stuffing bot hits News Ltd polls 
By Darren Pauli | Feb 12, 2013 | Comment Now 
Security efforts foiled.
Tor exit node operator raided by police 
By Darren Pauli | Nov 30, 2012 | Comment Now 
Says child pornography requests were Tor traffic.
Police struggle with online drug networks 
By Darren Pauli | Sep 11, 2012 | Comment Now 
Report paints bleak picture for narcotics enforcement.
Aussie coppers bedeviled by online contraband networks 
By Darren Pauli | Sep 10, 2012 | Comment Now 
War on the Silk Road requires legal barriers dismantled and police technical skills to be mapped.
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
Tor Project mulls $100 cheque for exit relay hosts 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Payments could speed up and secure the network.
Cyberoam hacked private key posted online 
By Darren Pauli | Jul 12, 2012 | Comment Now 
Tor users extract and decrypt private key.
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency