Archives for: "August 2019"

  2019-08-31

Using Tor to protect against certificate injection by Hotspots

  By Hagai Bar-El   , 667 words
Categories: IT Security, Day-to-Day Security Advice
Tor is typically used to attain anonymity and preserve privacy online. This is by far the most common and appealing use for it. Most people without such concerns are not likely to ever install a Tor browser on their workstations, and it's a pity; Tor… more »

Search

  XML Feeds

License

All contents licensed under the Creative Commons Attribution license.