A few weeks ago, we received a request to publish an article on behalf of an author residing in China. After review of its content, we are sharing these insights on the CyberSmashup blog. We hope you enjoy this post, learn something new about privacy and censorship, and if feeling compelled to respond or react, will … Continue reading The Great Firewall of China
The original post comes from the author's blog at http://h4ck.go.ddamn.it/. This year's CCC congress, 30c3, took place at the Congress Center Hamburg from the 27th to the 30th of December. From a pragmatic perspective, it was the occasion to draw 111MWh of electrical power, for the NOC to get 20 abuse phone calls as well as 653 … Continue reading What I saw at #30c3
Today's post covers Tor hidden services and their anonymity. In the first few paragraphs I will provide some basic, high level information on the Tor network and then talk about a way to uncover the real location of some anonymous hidden services. For those not familiar with it: Tor allows anyone to proxy their network traffic* … Continue reading Don’t run a Tor router and a hidden service from the same connection!