Editor_In_Chief

Editor_In_Chief

Last seen: 2 days ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 [email protected]

Following (7)

Followers (1)

Politics & Governance
How Do Copyright Rules Affect Internet Creators? And What Can They Do About It?

How Do Copyright Rules Affect Internet Creators? And What...

If you make and share things online, professionally or for fun, you’ve been affected...

Politics & Governance
Student Surveillance Vendor Proctorio Files SLAPP Lawsuit to Silence A Critic

Student Surveillance Vendor Proctorio Files SLAPP Lawsuit...

During the pandemic, a dangerous business has prospered: invading students’ privacy...

Politics & Governance
Cops Using Music to Try to Stop Being Filmed Is Just the Tip of the Iceberg

Cops Using Music to Try to Stop Being Filmed Is Just the...

Someone tries to livestream their encounters with the police, only to find that...

Latest Threats
TDoS Attacks Take Aim at Emergency First-Responder Services

TDoS Attacks Take Aim at Emergency First-Responder Services

The FBI has warned that telephony denial-of-service attacks are taking aim at emergency...

Latest Threats
10K Microsoft Email Users Hit in FedEx Phishing Attack

10K Microsoft Email Users Hit in FedEx Phishing Attack

Microsoft users are receiving emails pretending to be from mail couriers FedEx and...

Latest Threats
Finnish IT Giant Hit with Ransomware Cyberattack

Finnish IT Giant Hit with Ransomware Cyberattack

A major Finnish IT provider has been hit with a ransomware attack that has forced...

Politics & Governance
Racial and Immigrant Justice Groups Sue Government for Records of COVID-19 Data Surveillance

Racial and Immigrant Justice Groups Sue Government for...

Just Futures Law, MediaJustice, Mijente, Immigrant Defense Project and Electronic...

Latest Threats
IBM Squashes Critical Remote Code-Execution Flaw

IBM Squashes Critical Remote Code-Execution Flaw

A critical-severity buffer-overflow flaw that affects IBM Integration Designer could...

Latest Threats
Daycare Webcam Service Exposes 12,000 User Accounts  

Daycare Webcam Service Exposes 12,000 User Accounts  

NurseryCam suspends service across 40 daycare centers until a security fix is in...

News&Articles
Russian crypto exchange hacked!

Russian crypto exchange hacked!

LiveCoin service was under attack in December 2020

Tutorials
Postfix as a Send-Only SMTP Server

Postfix as a Send-Only SMTP Server

Let's show you how to install and configure Postfix as a send-only SMTP server on...

Politics & Governance
EFF to First Circuit: Schools Should Not Be Policing Students’ Weekend Snapchat Posts

EFF to First Circuit: Schools Should Not Be Policing Students’...

This blog post was co-written by EFF intern Haley Amster. EFF filed an amicus brief in...

Guest Posts
How Safe are VPNs?

How Safe are VPNs?

Once you start using VPN the next question almost always is if it can be tracked....

News&Articles
Dread Admin's Deadman's Switch Activated

Dread Admin's Deadman's Switch Activated

A mere week after Dread (the largest Tor forum) went down for maintenance, its admin,...

News&Articles
DutchDrugz is Back Online

DutchDrugz is Back Online

The vendor shop DutchDrugz, which had temporarily gone offline in July, is now back...

News&Articles
Psycho Social Network Seized by Law Enforcement

Psycho Social Network Seized by Law Enforcement

The popular Tor site known as Psycho Social Network was recently seized by the FBI...

Exploits
bg
HaE - BurpSuite Highlighter And Extractor

HaE - BurpSuite Highlighter And Extractor

HaE is used to highlight HTTP requests and extract information from HTTP response...

Exploits
bg
RAT-el - An Open Source Penetration Test Tool That Allows You To Take Control Of A Windows Machine

RAT-el - An Open Source Penetration Test Tool That Allows...

RAT-el is an open source penetration test tool that allows you to take control of...

Marketplaces
Monopoly (Market) Review and Tutorial

Monopoly (Market) Review and Tutorial

Monopoly Market is a different sort of darknet market than ones you may have experienced...

Guest Posts
Malware - It's worse than you think (Excerpt from 12Bytes.org)

Malware - It's worse than you think (Excerpt from 12Bytes.org)

UPDATE: Since writing this article i have finally dropped Windows and moved to Linux-based...

Exploits
bg
Remote-Method-Guesser - Tool For Java RMI Enumeration And Bruteforce Of Remote Methods

Remote-Method-Guesser - Tool For Java RMI Enumeration And...

remote-method-guesser (rmg) is a command line utility written in Java and can be...

Guest Posts
Adblocking: How About Nah? (Excerpt from EFF)

Adblocking: How About Nah? (Excerpt from EFF)

For more than a decade, consumer rights groups (including EFF) worked with technologists...

Exploits
bg
Horusec - An Open Source Tool That Improves Identification Of Vulnerabilities In Your Project With Just One Command

Horusec - An Open Source Tool That Improves Identification...

Horusec is an open source tool that performs static code analysis to identify security...

Exploits
bg
Perfusion - Exploit For The RpcEptMapper Registry Key Permissions Vulnerability (Windows 7 / 2088R2 / 8 / 2012)

Perfusion - Exploit For The RpcEptMapper Registry Key Permissions...

On Windows 7, Windows Server 2008R2, Windows 8, and Windows Server 2012, the registry...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here