[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Large spike in .onion addresses - port scan?

Renà Ladan:
> Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <arma@xxxxxxx>:
>> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote:
>>> With the large sudden spike in hidden services addresses, any way to
>>> view what the newly registered .onion addresses are or at least a
>>> list of hidden services during the suspected time frame?
>> No, there is no easy way to do this. That's because there is no central
>> repository of onion addresses. There are services like Ahmia that try to
>> enumerate what they can, by looking at various sources like the content
>> on a set of known onion sites. But that only lets you learn about sites
>> that wanted to let you find out about them.
>> This is actually a really complicated topic, because there are a wide
>> variety of ways of learning about onion addresses, each of which has
>> its own ethical questions around how invasive you have to be. For
>> example, you can get them by Googling for .onion addresses (probably
>> fine), or by being Verizon or Comcast and spying on the people who
>> use your DNS servers (not so fine), or by running Tor relays and spying
>> on the hidden service descriptors that people upload (not fine).
> Another service is http://tor.luakt.net , which managed to find my
> otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does listen
> on port 80 though.

LuaKT very likely runs a modified version of tor with additional logging
[1]. Until recently, the code was hosted on github.

Since I expected that this modified tor version will disappear from
github I made a copy of it while it was still there.



Attachment: signature.asc
Description: OpenPGP digital signature

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to