[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Large spike in .onion addresses - port scan?
Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <arma@xxxxxxx>:
>
> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote:
> > With the large sudden spike in hidden services addresses, any way to
> > view what the newly registered .onion addresses are or at least a
> > list of hidden services during the suspected time frame?
>
> No, there is no easy way to do this. That's because there is no central
> repository of onion addresses. There are services like Ahmia that try to
> enumerate what they can, by looking at various sources like the content
> on a set of known onion sites. But that only lets you learn about sites
> that wanted to let you find out about them.
>
> This is actually a really complicated topic, because there are a wide
> variety of ways of learning about onion addresses, each of which has
> its own ethical questions around how invasive you have to be. For
> example, you can get them by Googling for .onion addresses (probably
> fine), or by being Verizon or Comcast and spying on the people who
> use your DNS servers (not so fine), or by running Tor relays and spying
> on the hidden service descriptors that people upload (not fine).
>
Another service is http://tor.luakt.net , which managed to find my
otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does listen
on port 80 though.
RenÃ
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk