What is DDOS ?

A distributed denial-of-service (DDoS) attack targets websites and servers by disrupting network services. A DDoS attack attempts to exhaust an application’s resources. The perpetrators behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether. During a DDoS attack, a series of bots, or botnet, floods a website or service with HTTP requests and traffic. Essentially, multiple computers storm one computer during an attack, pushing out legitimate users. As a result, service can be delayed or otherwise disrupted for a length of time

Read more »

A List of 20+ Fingerprinting Demos and Tests

Are you leaking potentially identifying information? Use these tools to find out. Many demonstrations are basically forms of entertainment (gimmicks - think of those sites that “locate” you based on your “unprotected” I.P. address).

Read more »

Ring Signatures: What Are They & Do They Ensure Privacy in Monero

The pseudonymity of Bitcoin made it appealing to many new users, especially in its early days. However, its pseudonymity has become strained over the years as it began being surveyed by blockchain analysis firms and government agencies. As a result, privacy coins like Monero emerged, with embedded privacy protection at the base layer through the use of ring signatures. 

Read more »