Renà Ladan: > Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <arma@xxxxxxx>: >> >> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote: >>> With the large sudden spike in hidden services addresses, any way to >>> view what the newly registered .onion addresses are or at least a >>> list of hidden services during the suspected time frame? >> >> No, there is no easy way to do this. That's because there is no central >> repository of onion addresses. There are services like Ahmia that try to >> enumerate what they can, by looking at various sources like the content >> on a set of known onion sites. But that only lets you learn about sites >> that wanted to let you find out about them. >> >> This is actually a really complicated topic, because there are a wide >> variety of ways of learning about onion addresses, each of which has >> its own ethical questions around how invasive you have to be. For >> example, you can get them by Googling for .onion addresses (probably >> fine), or by being Verizon or Comcast and spying on the people who >> use your DNS servers (not so fine), or by running Tor relays and spying >> on the hidden service descriptors that people upload (not fine). >> > Another service is http://tor.luakt.net , which managed to find my > otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does listen > on port 80 though. LuaKT very likely runs a modified version of tor with additional logging [1]. Until recently, the code was hosted on github. Since I expected that this modified tor version will disappear from github I made a copy of it while it was still there. http://article.gmane.org/gmane.network.onion-routing.ornetradar/937 http://article.gmane.org/gmane.network.onion-routing.ornetradar/945 [1] https://lists.torproject.org/pipermail/tor-relays/2016-January/008647.html
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk