Tag Archive for: developed

Hacker spills code developed to crack San Bernardino iPhone

In an interview with Motherboard, the hacker responsible said that the release was a demonstration that, “when you create these tools, they […](via Cult of Mac – Tech and culture through an Apple lens)
mac hacker – read more

Researchers claim they’ve developed a better, faster Tor

Tor, the world’s largest and most well-known “onion router” network, offers a degree of anonymity that has made it a popular tool of journalists, dissidents, and everyday Internet users who are trying to avoid government or corporate censorship (as well as Internet drug lords and child pornographers). But one thing that it doesn’t offer is speed—its complex encrypted “circuits” bring Web browsing and other tasks to a crawl. That means that users seeking to move larger amounts of data have had to rely on virtual private networks—which while they are anonymous, are much less protected than Tor (since VPN providers—and anyone who has access to their logs—can see who users are).

A group of researchers—Chen Chen, Daniele Enrico Asoni, David Barrera, and Adrian Perrig of the Swiss Federal Institute of Technology (ETH) in Zürich and George Danezis of University College London—may have found a new balance between privacy and performance. In a paper published this week, the group described an anonymizing network called HORNET (High-speed Onion Routing at the NETwork layer), an onion-routing network that could become the next generation of Tor. According to the researchers, HORNET moves anonymized Internet traffic at speeds of up to 93 gigabits per second. And because it sheds parts of Tor’s network routing management, it can be scaled to support large numbers of users with minimal overhead, they claim.

Like Tor, HORNET encrypts encapsulated network requests in “onions”—with each layer being decrypted by each node passing the traffic along to retrieve instructions on where to next send the data. But HORNET uses two different onion protocols for protecting anonymity of requests to the open internet and a modified version of Tor’s “rendezvous point” negotiation for communication with a site concealed within the HORNET network.

Read 6 remaining paragraphs | Comments


Ars Technica » Technology Lab

Silk Road operators developed a taste for murder

Chat logs and other digital records entered into evidence in a federal court case Monday detailed how the operators of the infamous Silk Road underground online marketplace planned to have individuals murdered for potentially disclosing the identities of those who used the anonymous site.

Over the course of March and April 2013, an individual operating under the Silk Road administrator account Dread Pirate Roberts had paid an individual, or group of individuals, approximately $ 650,000 worth of bitcoins to carry out as many as five murders, digital records indicated.

Whether any of these murders were actually carried out remains a mystery. Police have never been able to find any bodies that matched the details of the supposed murders, nor have they found any records of the supposed real names of the people the contract killers claimed to have killed. The defendant in the case, Ross Ulbricht, does not face murder conspiracy charges in the current case in New York.

To read this article in full or to leave a comment, please click here

Network World Security

Anti-Virus Makers: U.S. May Have Developed Three Other Cyber Warfare Viruses – ThinkProgress


ThinkProgress

Anti-Virus Makers: U.S. May Have Developed Three Other Cyber Warfare Viruses
ThinkProgress
The digital era has dramatically changed the tactics available to countries engaging in espionage and sabotage, but cyber warfare raises it's own set of new moral questions. Deploying targeted malware to crash centrifuges is arguably preferable to more
US Role In Cyber War With Iran May Be Larger Than SuspectedRedOrbit
Researchers Uncover US Footprints in Mysterious Cyber Warfare ToolsBetabeat
US may have three previously unknown cyberwarfare viruses: security expertsNational Post
Phys.Org
all 182 news articles »

cyber warfare – read more