#tor

[ follow ]
Information security
fromThe Hacker News
4 days ago

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

A TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.
Privacy technologies
fromZDNET
2 weeks ago

The one-click Linux app I use for instant online anonymity

Carburetor provides one-click Tor-based anonymity and encryption for all Linux desktop applications via a Flatpak, offering global protection beyond the Tor Browser.
[ Load more ]