Service Provider Blocks Tor to Silent Circle Claiming Security Threat January 21 2015The Claim:”Tor exist nodes are routinely used as methods by Threat Actors to exfiltrate data from compromised endpoints. As an example, the Financial Sector has seen significant issues from them.“ FireHostThe Issues:• Bad guys use it; let’s treat everybody as bad guys • […]
Author Archive: Blogmaster1
Email insecurity video
This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let’s start with something that has become an indispensable tool for communication in our world and I’m referring to the email. Email can […]
Post Centered Style Icon-L
This is an H1 headline.It reverts to paragraph with return, unfortunately.How can we keep this as H3 default? Is there ANY way to set a default text?