Tag: monitoring techniques
-
Schneier on Security: Law Enforcement Deanonymizes Tor Users
Source URL: https://www.schneier.com/blog/archives/2024/10/law-enforcement-deanonymizes-tor-users.html Source: Schneier on Security Title: Law Enforcement Deanonymizes Tor Users Feedly Summary: The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay. Tor has written about this. Hacker News…
-
The Register: How to spot a North Korean agent before they get comfy inside payroll
Source URL: https://www.theregister.com/2024/09/24/mandiant_north_korea_workers/ Source: The Register Title: How to spot a North Korean agent before they get comfy inside payroll Feedly Summary: Mandiant publishes cheat sheet for weeding out fraudulent IT staff Against a backdrop of rising exposure to North Korean agents seeking (mainly) US IT roles, organizations now have a cheat sheet to help…