Service Provider Blocks Tor to Silent Circle Claiming Security Threat

 Service Provider Blocks Tor to Silent Circle Claiming Security Threat January 21 2015The Claim:”Tor exist nodes are routinely used as methods by Threat Actors to exfiltrate data from compromised endpoints. As an example, the Financial Sector has seen significant issues from them.“ FireHostThe Issues:• Bad guys use it; let’s treat everybody as bad guys • […]

Email insecurity video

This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let’s start with something that has become an indispensable tool for communication in our world and I’m referring to the email. Email can […]