The hottest Dark web Substack posts right now

And their main takeaways
Category
Top Technology Topics
CrashOut by Ioan Grillo β€’ 825 implied HN points β€’ 04 Oct 23
  1. The dark web can be used for illicit activities like hiring hitmen and selling illegal weapons.
  2. Scammers on the dark web may offer false information about hiring hitmen to deceive others for financial gain.
  3. Investigating crimes on the dark web can reveal potential links to real-world incidents, showcasing the need for vigilance in cyberspace.
Rod’s Blog β€’ 79 implied HN points β€’ 09 Feb 24
  1. The dark web offers anonymity but is a haven for illegal activities like cybercrime, so be cautious.
  2. Cybersecurity best practices include using strong passwords, updating devices, and avoiding suspicious links.
  3. Protect your computers with firewalls, antivirus software, data encryption, and regular backups to safeguard against cyber threats.
Import AI β€’ 319 implied HN points β€’ 29 May 23
  1. Researchers have found a way to significantly reduce memory requirements for training large language models, making it feasible to fine-tune on a single GPU, which could have implications for AI governance and model security.
  2. George Hotz's new company, Tiny Corp, aims to enable AMD to compete with NVIDIA in AI training chips, potentially paving the way for a more competitive AI chip market.
  3. Training language models on text from the dark web, like DarkBERT, could lead to improved detection of illicit activities online, showcasing the potential of AI systems in monitoring and identifying threats in the digital space.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Dr. Pippa's Pen & Podcast β€’ 9 implied HN points β€’ 14 Apr 23
  1. Digital footprints can reveal online activities and lead to consequences in the real world.
  2. Outsourcing military IT systems to private contractors can pose risks regarding national security and loyalty.
  3. Young IT specialists may lead double lives, engaging in dark net activities while holding day jobs with access to classified information.
Secure GenAI β€’ 0 implied HN points β€’ 29 Mar 24
  1. Hackers are increasingly using social engineering tactics to compromise security, like with the GoldPickaxe trojan targeting iOS devices.
  2. Phishing attacks are evolving to be more sophisticated, with scammers utilizing messaging platforms and Generative AI to create malicious content.
  3. The landscape of cyber threats is changing, with a rise in no-code hacking tools available on the dark web and operated by groups in regions with weaker cybersecurity laws.