[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] 276 seized onion addresses from Operation Onymous identified - most are scam or clone sites
So it wasn't a DDoS attack? They just did it reverse style, instead of
.onion->ip, they did ip-> .onion?
2014-11-18 19:45 GMT+01:00 grarpamp <grarpamp@xxxxxxxxx>:
> On Tue, Nov 18, 2014 at 12:30 AM, Nik Cubrilovic <nikcub@xxxxxxxxx> wrote:
> > https://www.nikcub.com/posts/onymous-part1/
>
> Running a similar project following onionspace I can echo
> a lot of your, ahmia's and others data and generalisations.
> The cloner was proxy not mirror, and easy to deal with.
> And not everything that's down is attributable to direct seizure
> action... as with the last big down event, shared hosting/operation,
> nerves, and games always add noise to any such list.
> It will take a while to sort this one out.
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk