Anonymous retaliates against takedown

It didn’t take long for hacktivists to respond to the takedown of the popular video streaming portal Activists affiliated with Anonymous responded on Thursday with a denial-of-service attack against the web site of a rights holders group. Insiders meanwhile believe that will return soon.

Let’s Be Careful About Calling This a Cyber-War

Terms like “cyber-war” have been used to describe the denial-of-service attacks waged by anonymous hackers against the companies that cut off support for WikiLeaks. But the attacks were nothing like a real cyber-war, security experts say, and calling them that could have unintended consequences.

WikiLeaks Gets Its Own “Axis of Evil” Defense Network

As the U.S. government and a series of corporations such as Visa, MasterCard and PayPal keep up the pressure on WikiLeaks, a rough alliance of hackers and supporters have taken it upon themselves to wage an ongoing cyber-war in defense of the document-leaking organization.

Tor On the Mac: Not as Hard as It Looks


Until very recently, Tor was always something I heard about online but never used. I never considered myself enough of a “hardcore” geek to really pursue it, but it turned out to be much simpler to use that I thought. So for those of you that were like me consider this a crash course in Tor for the Mac.

What is Tor?

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

As its icon implies, Tor acts like an onion in the way that your online traffic is protected. If someone wanted to track your online activities while running Tor they would see only the layers and layers of relays run by volunteers worldwide. Due to the large number of relays, the original source of the traffic (you) is virtually invisible.

Although people are quick to associate Tor with illegal online activity, many other people and organizations use Tor for legitimate, and often life-saving, activities. For example, journalists in certain countries where honest reporting is punishable by prison or death can use Tor to publish their stories anonymously. According to

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

Hopefully you can begin to see the advantages of having a service like Tor and the hundreds of people who volunteer their computers for relays to help protect the privacy of the rest of us. Visit the overview page of for a great set of illustrations created by the Electronic Frontier Foundation (EFF) on how Tor works.
Read More about Tor On the Mac: Not as Hard as It Looks