Bitcoin Paper Wallet is an open-source paper wallet generator based on the BitAddress generator. It runs on any modern web browser and relies on JavaScript for all cryptographic functionality. Secure usage The easiest way to use this generator is directly from the website — however, this is also the least secure method. A more secure process is to download the generator from GitHub so … Read moreBitcoin Paper Wallet

Bitcoin Mixer (Blender) is something that helps you to shuffle your bitcoins using our algorithms and to secure your identity.

OVERVIEW WHAT IS BITCOIN MIXER? Bitcoin mixer is a very impressive service if you want to maintain your anonymity when you want to make purchases online. It can also be useful if you want to do p2p payments and donations. Service is used to mix a person’s funds and give this person some fresh bitcoins. … Read moreBitcoin Mixer (Blender) is something that helps you to shuffle your bitcoins using our algorithms and to secure your identity.

Bitcoin Anonymity & Security

Transactions The using of bitcoin is an excellent way to donate money, make your purchases and pay p2p without losing money through inflated transaction fees, however, those transactions are never truly anonymous. Buying Bitcoin you pass identification, Bitcoin transactions are stored publicly and permanently on the network, which means anyone can see the balance and transactions of any Bitcoin … Read moreBitcoin Anonymity & Security

Signals intelligence operational platforms by nation

Signals intelligence operational platforms are employed by nations to collect signals intelligence, which is intelligence-gathering by interception of signals, whether between people (i.e., COMINT or communications intelligence) or between machines (i.e., ELINT or electronic intelligence), or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who … Read moreSignals intelligence operational platforms by nation


Rublon is a two-factor authentication system that acts as an additional security layer which protects the password-based login process to web applications. A protected account can only be accessed by someone who enters the correct password and scans a QR code using the Rublon mobile app, which holds the digital identity of the account’s owner. In web browsers that have been previously defined as trusted, only the password is needed in … Read moreRublon

Bitcoin faucet

Bitcoin faucets are a reward system, in the form of a website or app, that dispenses rewards in the form of a satoshi, which is a hundredth of a millionth BTC, for visitors to claim in exchange for completing a captcha or task as described by the website. There are also faucets that dispense alternative cryptocurrencies. Gavin … Read moreBitcoin faucet

Universal 2nd Factor

Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication using specialized USB or NFC devices based on similar security technology found in smart cards. While initially developed by Google and Yubico, with contribution from NXP Semiconductors, the standard is now hosted by the FIDO Alliance. U2F Security Keys are supported by Google Chrome since version 38 GitHub, GitLab, Bitbucket, Nextcloud, Facebook and others. Chrome, Firefox, and Opera are currently the only browsers … Read moreUniversal 2nd Factor

The Pirate Bay

The Pirate Bay (sometimes abbreviated to TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download and contribute magnet links and torrent files, which facilitate peer-to-peer file sharing among users of the BitTorrent protocol. In April 2009, the website’s founders (Peter Sunde, Fredrik Neij and Gottfrid Svartholm) were found guilty in The Pirate Bay trial in … Read moreThe Pirate Bay

Telex (anti-censorship system)

Telex is a research anti-censorship system that would allow users to circumvent a censor without alerting the censor to the act of circumvention. It is not ready for real users, but a proof-of-concept mock system exists. Purpose Telex complements services like Tor by placing Telex stations in the network infrastructure of free countries. A client can create a TLS tunnel … Read moreTelex (anti-censorship system)