I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet’s control servers.
Kimwolf is a botnet that surfaced in late 2025 and quickly infected millions of systems, turning poorly secured IoT devices like TV streaming boxes, digital picture frames and routers into relays for ...
Traditionally, I2P did not support UDP-based BitTorrent trackers, which limited compatibility with many torrents. Proposal 160 introduces a specification to allow UDP BitTorrent tracker announces over ...
Changes are afoot at Pay2Key, a ransomware-as-a-service (RaaS) gang with ties to a notorious Iranian nation-state threat group, and it could spell trouble for the US. Pay2Key was first observed in ...
Do you know you can use a USB stick or DVD to anonymize, encrypt, and hide everything you actually do on a computer? Yes, it is possible, and the answer is Tails Live Operating System. Tails is a ...
CrowdStrike analyzed an I2Pminer variant that targets macOS The mineware utilizes I2P to hide XMRig network traffic CrowdStrike recently analyzed a macOS-targeted mineware campaign that utilized ...
For the past seven months, anonymous communications platform Tor has been experiencing different types of Distributed Denial of Service (DDoS) attacks causing outages and slowdowns for users, the ...
If you've been experiencing Tor network connectivity and performance issues lately, you're not the only one since many others have had problems with onion and i2p sites loading slower or not loading ...
Privacy hosting company StormyCloud experienced ups and downs in 2022, adapting to new opportunities .Plans include TOR & I2P hosting and a free privacy VPN. AUSTIN ...