Advisories

Discover LinuxSecurity Features

Open Source Intelligence, Security Hacking, and Security Blogger Dancho Danchev - Zero-day Threats and Security Blogging

Open Source Intelligence, Security Hacking, and Security Blogger Dancho Danchev - Zero-day Threats and Security Blogging

Anonymous Communication Using Tor

One of the most useful tools in the arsenal of the security intelligence hacker is Tor, the free and open-source software for enabling anonymous communication. The name is derived from the acronym for the original software project name, "The Onion Router". Tor was initially a worldwide network of servers built for the US Navy that enabled people to browse the Internet anonymously.

Tor disguises your identity by transferring your traffic between different Tor servers, encrypting that traffic so it isn’t tracked back to you.


Accessing the Tor network requires using the Tor browser. It’s typically used in environments where you’re concerned about being tracked, such as if you live under a dictatorship or a hacker looking to stay hidden from the government.

“I believe it was around 2006 when I was busy researching several U.S Government programs including SPAWAR. I then decided to use it including several other covert communication tools for the purpose of preventing my local ISP from intercepting what I was doing online,” writes Dancho.

He continues, “At the time in particular the 90’s many Eastern European countries part of the Soviet Union at the time were under technology embargo which was known as COCOM with personal computers at the time being something in the lines of a luxury and only organizations and companies could really afford them.”

Dancho also talks about the Space and Naval Warfare Systems Command, known as SPAWAR, and the research they produced for foreign intelligence and other US Government programs as a valuable resource.

Comments (0)

There are no comments posted here yet
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.