Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Tor Project Auctions Off The First Onion URL Ever Created As An NFT

Tor Project Auctions Off The First Onion URL Ever Created As An NFT

The Tor Project is auctioning off the first Tor Onion domain ever created, duskgytldkxiuqc6.onion, as an NFT.

The non-profit Tor Project operates the Tor decentralized network running on top of the Internet that allows users to access websites anonymously and special Onion URLs (.onion) only accessible over Tor.

Commonly referred to as the dark web, Tor allows website developers to create special onion services that are only accessible via the Tor network and provide anonymity to the service owner.

The first onion service ever created by the Tor project is Dusk at http://duskgytldkxiuqc6.onion, which is commonly used as an example Onion service in Tor-related documentation and help files.

Also Read: The Difference Between GDPR And PDPA Under 10 Key Issues

The duskgytldkxiuqc6.onion dark web site

As a fund-raiser, Tor is auctioning off the RSA1024 cryptographic private key used to create Dusk along with a one-of-a-kind NFT art piece named “Dreaming at Dusk” created from the key by Itzel Yard (@ixshells).

Tor’s auction is happening on the, the platform Edward Snowden recently auctioned an NFT for 2,224.00 ETH (~$7 million USD).

The winning bidder will receive the key on November 1st, 2021, and the Tor Project says it can be delivered however “The Owners” wish.

“Hereinafter, the owner(s) of the ‘Dreaming at Dusk’ NFT on November 1st 2021 00:00UTC shall be called ‘The Owners’. The Owners shall receive the RSA1024 private key of this onion service. The private key shall be sent to The Owners in any way preferable to them — let that be an encrypted message over their protocol of choice, uploaded on a blockchain, or physically shipped in a USB stick or DVD drive.”

“Following the receipt of the private key by them, the private key belongs to The Owners and may be used in whatever way The Owners find suitable. The Owners may contact us at dusk[at] The Owners may refuse to accept the private key if they so want,” the Disk Tor service currently reads.

Readers should note that the auction winner will receive the private key for Dusk after Tor has finished migrating the Tor onion services from version 2 to version 3.

Also Read: PDPA Compliance Singapore: 10 Areas To Work On

This deprecation means that the winner cannot use the Dusk private key to host the Onion service, and the key will simply be an artifact of Tor’s history.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us