Our valued sponsor

security

  1. gh0p

    Timing analyses by Law enforcement agencies undermine Tor anonymisation

    I didn't see anyone post or discuss the news about Tor here it is. Quoting ease of read and future preservation. https://blog.torproject.org/tor-is-still-safe/ The reports mentioned are these two links Tor lists [tor-relays] [Important] Update on an upcoming German broadcasting story about...
  2. gh0p

    Premium Advertising Partner Ultimate Security, Anonymity & Privacy for Elite Individuals and Corporations -- GH0P Security & Business

    Ultimate Security, Anonymity & Privacy for Elite Individuals and Corporations -- GH0P Security & Business In today's digital age, being a high-net-worth individual makes you a prime target for online threats and privacy breaches. Data leaks, phishing, targeted attacks, unsanctioned government...
  3. sebastian

    What tool can encrypt a laptop's data instantly when it's closed, and how do you set it up?

    I watched a TV show last night about a business owner in India who travels around Europe selling illegal medicine. When he was caught at London airport, he was sitting with his laptop but managed to close it. At that moment, the entire machine was encrypted with 32-bit encryption, as they said...
  4. B

    VMProtect Expert Developer / Unpacker | Highly Paid

    Hello there, Since I am new to this forum, I'm not sure if this is the right place to post this thread or even if this thread is allowed to be opened here. Please let me know if I need to transfer it. Anyway, I am looking for an experienced security expert (or hacker/cracker), experienced in...
  5. tradingworldwide321

    Question System Operative, Machine, Smartphone and apps focused on privacy and security

    Hello all I hope you are doing well. I was wondering what are the best System Operatings, laptops brands, smartphones brands, apps for encrypted email, chat and voice communication, web browsing, passwords managers and vpn/vps providers all focused on privacy and security. As far as I have...
  6. MiddleEuroAsia

    Apple plans to scan US iPhones for child ab*se imagery, in other words, apple will install a backdoor in your phone.

    ----------------start------------------------ Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s...
  7. R

    Buying computers without interception/bugging

    Any advice for how to buy computer equipment online, with reduced risk that a friendly NSA agent will intercept the shipment and implant a hardware bug in it? I have not bought any computers since before the Snowden leaks disclosed this as a real threat. My remaining computers are slow, and...
  8. Xeovo

    [Xeovo VPN] Key to your privacy from 2,99$/mo

    Xeovo is a self-funded VPN company based in Finland since 2016. As a team, we thrive on privacy, security, and freedom. We enjoy what we do, understand our customers and deliver a VPN that clients love and need. Features Stop 3rd Party Spying Xeovo protects you from ISP tracking and...