-
The 2013 Android Bitcoin Wallet Vulnerability: A Lesson in Randomness
Analysis of the 2013 Android Bitcoin wallet vulnerability that led to 55.82 BTC theft. Learn how Android's SecureRandom PRNG weakness allowed duplicate private key generation and wallet compromise.
-
Onion Browser 2.0: Enhanced Privacy for iOS Users
Complete guide to Onion Browser 2.0 for iOS - the official Tor-powered browser for iPhone. Learn about privacy features, installation, and anonymous browsing on iOS devices with Tor integration.
-
Setting Up a Tor Middle Relay Node
Complete guide to setting up a Tor middle relay node. Learn how to contribute to Tor network anonymity by configuring bandwidth limits, port settings, and monitoring relay performance on Tor Atlas.
-
Tor in the Internet of Things (IoT)
Discover how Tor's .onion addresses solve IPv4 scarcity in IoT. Learn about the Internet of Onion Things using ed25519 cryptography (2²⁵⁶ address space) for secure, anonymous IoT device communication.
-
Generating .onion Addresses: A Step-by-Step Guide (Tor v2 & v3)
Learn how .onion addresses are generated using RSA-1024 (v2) and ed25519 (v3) cryptography. Detailed technical guide comparing Tor v2 and v3 address generation with SHA-1, SHA-3, and Base32 encoding.