Assemblies of Al #Ar1ri

Total Page:16

File Type:pdf, Size:1020Kb

Assemblies of Al #Ar1ri THE ASSEMBLIES OF AL #AR1RI ORIENTAL TRANSLATION FUND. NEW SEEIES. III. THE ASSEMBLIES OF AL HARIRI, Ifranstctieb from ffce Jlrabic, WITH 3TOTES, HISTORIQAL the A#8ewblie8 Q Bclitoi of latest Arable twit of Warm's t Englmh, Arabic and Persian JjictionanM. BV F. P. AEBUTHNOT, M.B.A.S. VOL, II. CONTAINING THE LAST TWENTY-FOUR P&IKTEL AND PVBLISBEV VNDER THE PATRONAGE OS1 TB.R ROYAL ASIATIC SOCIETY, AND SOI D AT 22, ALBEMAELE STREET, LONDON, THOMAS CHENERY, M.A., BORN 1826 ; DIED 1884. WE "know not what havens to UK spiritually after death, and can only repent in the words of the Koran, " IVc belong to God, and unto Him we shall surely return'' Btill, If there be sueh <t thing as continuation, should you (wherever you may be) happen io learn tliat your great worlf here hns been comjneted and indexed, the fact will not, I trust, displease you. Admirvngly 7/owrs, F. F. AEBUTHNOT. PREFACE, work of Hariri consists of or TUB great fifty Maldmfit, Assemblies. Of these the late Mr. Thomas Chenery translated and published the first twenty-six, with in 18()7. copious and valuable notes, Ho had fully intended to complete the translation of the remaining twenty-four, and also to prepare an Index to the two volumes. Rut called away to the editorship of the 7Yww in 1877, his hopes end expectations were never fulfilled, and he died in 1881, leaving his task un- finished, Tn 1891 the Oriental Translation Fund, which had existed from 1828 to 1878, was revived under the same name, but as a new series. Among the works that came under the consideration of the committee appointed Council of the Asiatic trans* by the Royal Society, the of lation and annotation the remaining twenty-four of Dr. F. Assemblies Hariri, proposed by Sfeingass, held an important place, and was accepted. l>v the courtesv of the executors of the late Mr, viii PREFACE. unbound of his Chenery, two hundred and fifty copies these work were obtained and purchased, and during Dr. F. negotiations, with zeal and ability Steingass and translated the remaining twenty-four Assemblies, valuable notes. explained them with important and has been To the above a complete descriptive index added, and these two volumes, bound with the covers of the Oriental Translation Fund New Series, form the issue for 1898 in continuation of the works which have been annually published by the Fund since 1891. Mr. Chenery's introduction to the first volume (extending from pages 1 to 102) contains such a com- plete survey of the whole work that it is hardly neces- sary to add to it. But the contents of the second volume continue to show the wonderful subtleties, pliabilities, fertilities, boundless resources and extra- ordinary richness of the Arabic language. A careful of perusal the two volumes will fully bear out the generally-expressed opinion that, next to the Koran, the Assemblies of Hariri are the most celebrated pro- duction of Arabic literature. these Throughout Assemblies, as Chenery says in his " notes at page 273, Not only are verses of the Koran but the freely introduced, whole language is tinged with allusions to which are it, almost imperceptible to PREFACE. ix the European, but which are readily caught by a Moslem who knows the sacred work by heart." In the same way there are many and constant allusions to Arab proverbs, which form a very valuable and instructive addition to the work. Every mention of them, and every allusion to the Koran, have been carefully noted in the index, and, though the references are numerous, it will enable the student or the enthusiast to go through the details of them without any difficulty. This also applies to other subjects, such as Traditions, Legends, Arab manners and customs, etc. Dr. Steingass has completed his portion of the work under great physical difficulties. For some part of the time he was actually blind, and even after his recovery was obliged to be extremely cautious so as not to over- strain his eyesight. His Student's Edition of the Arabic text of the Assemblies of Hariri was published by Sampson Low, Marston and Co. in 1897, while his translation of the last twenty-four Assemblies follows in 1898. One word about the transliteration from the Arabic of the second volume, regarding .which Dr. Steingass was much conceited. Since 1867 considerable pro- gress has been made in this subject, and he was naturally anxious that the names of the people and the places as spelt by Mr. Chenery should be spelt in the x PREFACE. there was style now generally in use. Consequently of Mr. some difference between the transliteration to and it was necessary Chenery and Dr. Steingass, decide how this matter should he dealt with. both advisable For the sake of uniformity, it seemed and and desirable that the names of people, places second volume as in the things should be spelt in the Dr. wish, first, and I insisted, much against Steingass's that this should be done. In this, then, the translitera- as tion of the two volumes will be found to agree, and has had a free hand. regards the rest, Dr. Steingass transla- The difference between the spelling of the two tors will be found in Appendix B at the end of the second volume. The Index to the whole work is rather long, but it was absolutely necessary to give a short description of the various people who appear upon the scene, so that it might be understood at a glance who and what they were. This has been curtailed as much as possible, but further i formation about them can be obtained from the following works, translated for the Oriental Transla- tion Fund Old and New Series : Ibn Khailibin's (1) Biographical Dictionary (O.3.). (2) Hajji Khalfeh's Lexicon (O.S.). Mas'udi's (3) Historical Encyclopaedia (O.S.) (4) Tabari's Chronicles (O.S.). PREFACE. a " " of (5) Mirkhond's Rauzat-us-safa," or Garden Purity" (N.S.). The following works will also be found useful for reference. " (6) Hughes' "Dictionary of Islam (W. H, Allen and Co., London. 1885), (7) Sale, Rodwell, and Palmer's Translations of the Koran. (8) Freytag's Translation of Arab Proverbs into Latin, in three volumes. Burton's to (9) "Pilgrimage Al-Madinah and Meccah" (Tylston and Edwards, London, 1893). " Arabic Authors (10) {William Heinemann, 185)6). Although thirty years have elapsed since Mr. Ohenery published his valuable translation of the first twenty- six Assemblies of Hariri, it is a matter of congratula- tion that the whole work has now been completed and indexed, and that it has been done into English nd in England. F. F. ARBUTHNOT. 22, ALBEMARLE STREET, LONDON, W, THE ASSEMBLIES OF AL HAElEL THE TWENTY-SEVENTH ASSEMBLY, CALLED "OF THE TBNT-DWELLERS." In this Assembly, which Hariri himself marks out as of some importance from a philological point of view by attaching to it a short commentary of his own, Al Harith records another of his early reminiscences. In his youth he cherished a strong desire to mingle with Arabs of the desert, in order to make himself familiar with their manners and idioms. After having acquired, by strenuous exertion, a live-stock of camels and sheep, he settles amongst a Bedouin tribe of genuine descent, who willingly accord him their protection. One night a valuable milch camel wont astray, and he sets out on horseback in search of her* During the night and the are ensuing forenoon his efforts to find her unavailing, and when mid-day grows high [approaches] with its oppressive heat, he feels compelled to seek shelter and rest under a shady tree. Scarcely has he done so, when he perceives a solitary wanderer nearing his of at the resting-place. With mingled feelings annoyance intrusion of a stranger, and of hope that he might hear through him news of his strayed camel, he awaits his coming, On his closer approach, however, he recognises in him Abft Zayd, whose welcome companion- ship makes him almost oblivious of his loss. In reply to his affectionate inquiries, Abft Zayd improvises some beautiful verses, his in which he describes in racy language Bohemian way of living, which renders him independent of favours that would have to be courted by self-ab ement, more hateful to him than death itself. After having questioned on his part Al Harith as to the re on of told his presence in this lonely spot, and being about the lost be t, and the hitherto fruitless search for her, he begs leave to take his VOL II. 1 2 TWSNTY-SSVBSTH ASSEMBLY. drowned in it. Al Htoith tries noon-day sleep, and is soon deeply makes him succumb to keep awake, but the lull in their conversation he finds to his drowsiness, and when he rouses himself at night-fall horse. In to his dismay that Abft Zayd is gone together with the a camel sore distress he awaits the morning, when he sees a rider on his to attract travelling in the desert, to whom he waves garment, has to run his attention, but the signal remains unheeded, and he it after the man, intending to ask him for a lift, however grudgingly on closer might be granted. Having reached him, he perceives scrutiny that the man is seated on the lost camel. He drags him down from her back, and a violent altercation takes place, in the midst of which Abu Zayd again appears on the scene, and his Doming, after yesterday's experience, at first fills Al Harith with misgivings as to his further intentions.
Recommended publications
  • Songs by Artist
    Reil Entertainment Songs by Artist Karaoke by Artist Title Title &, Caitlin Will 12 Gauge Address In The Stars Dunkie Butt 10 Cc 12 Stones Donna We Are One Dreadlock Holiday 19 Somethin' Im Mandy Fly Me Mark Wills I'm Not In Love 1910 Fruitgum Co Rubber Bullets 1, 2, 3 Redlight Things We Do For Love Simon Says Wall Street Shuffle 1910 Fruitgum Co. 10 Years 1,2,3 Redlight Through The Iris Simon Says Wasteland 1975 10, 000 Maniacs Chocolate These Are The Days City 10,000 Maniacs Love Me Because Of The Night Sex... Because The Night Sex.... More Than This Sound These Are The Days The Sound Trouble Me UGH! 10,000 Maniacs Wvocal 1975, The Because The Night Chocolate 100 Proof Aged In Soul Sex Somebody's Been Sleeping The City 10Cc 1Barenaked Ladies Dreadlock Holiday Be My Yoko Ono I'm Not In Love Brian Wilson (2000 Version) We Do For Love Call And Answer 11) Enid OS Get In Line (Duet Version) 112 Get In Line (Solo Version) Come See Me It's All Been Done Cupid Jane Dance With Me Never Is Enough It's Over Now Old Apartment, The Only You One Week Peaches & Cream Shoe Box Peaches And Cream Straw Hat U Already Know What A Good Boy Song List Generator® Printed 11/21/2017 Page 1 of 486 Licensed to Greg Reil Reil Entertainment Songs by Artist Karaoke by Artist Title Title 1Barenaked Ladies 20 Fingers When I Fall Short Dick Man 1Beatles, The 2AM Club Come Together Not Your Boyfriend Day Tripper 2Pac Good Day Sunshine California Love (Original Version) Help! 3 Degrees I Saw Her Standing There When Will I See You Again Love Me Do Woman In Love Nowhere Man 3 Dog Night P.S.
    [Show full text]
  • Someone's in the Kitchen Where's Dinah? Gendered Dimensions of the Professional Culinary World"
    DePaul University Via Sapientiae College of Education Theses and Dissertations College of Education Spring 6-14-2013 SOMEONE’S IN THE KITCHEN, WHERE’S DINAH? GENDERED DIMENSIONS OF THE PROFESSIONAL CULINARY WORLD Stephanie Konkol DePaul University Follow this and additional works at: https://via.library.depaul.edu/soe_etd Part of the Education Commons Recommended Citation Konkol, Stephanie, "SOMEONE’S IN THE KITCHEN, WHERE’S DINAH? GENDERED DIMENSIONS OF THE PROFESSIONAL CULINARY WORLD" (2013). College of Education Theses and Dissertations. 68. https://via.library.depaul.edu/soe_etd/68 This Dissertation is brought to you for free and open access by the College of Education at Via Sapientiae. It has been accepted for inclusion in College of Education Theses and Dissertations by an authorized administrator of Via Sapientiae. For more information, please contact [email protected]. DePaul University College of Education SOMEONE’S IN THE KITCHEN, WHERE’S DINAH? GENDERED DIMENSIONS OF THE PROFESSIONAL CULINARY WORLD A Dissertation in Education With a Concentration in Curriculum Studies by Stephanie M. Konkol Copyright 2013 Stephanie M. Konkol Submitted in Partial Fulfillment Of the Requirements For the Degree of Doctor of Education June 14, 2013 iii ABSTRACT Traditionally cooking is considered to be women’s work, yet the vast majority of professional chefs, particularly in the upper echelons of restaurant work, are men. These curious gendered patterns stimulated interest in delving more deeply into the gendered nature of restaurant work. Existing research on this topic has concentrated on the front of the house (dining room) but has not addressed the gendered nature of the male-dominated back of the house (kitchen).
    [Show full text]
  • FITA Level 1 Coaching Guide
    COACHES MANUAL ENTRY LEVEL http://www.archery.org FITA Coaches Committee Coaching Manual - Entry Level Table of Content s Introduction Chapter 1 The archer’s skills Chapter 2 S teps of the Shooting Sequence Chapter 3 Safety Chapter 4 Archery Classes and Entry level Program Chapter 5 Common Problems Chapter 6 Coach’s Role Chapter 7 Teaching suggestions for the Coach Chapter 8 Tip s for your demonstration, organization and present ation Chapter 9 Tip s for practice planning Chapter 10 Some suggested Teaching exercises Chapter 11 Facilities for group instruction Chapter 12 The disabled archer Chapter 13 Games COACHING MANUAL Glossary COACHING MANUAL Dear Coaches and Friends, As President of FITA, I am very pleased with the results of the hard work of the Coaches Committee, the FITA office and all those coaches who have contributed to this valuable manual. FITA now has an updated coaching manual that will unify the basic coaching knowledge of the best coaches in the world. It is important that a uniform method be used at the basic level to give all new enthusiasts a well-tested foundation of the best archery practices. Archers will be able to go from this level to that of a recreational, national or international participant, building on this basic training with intermediate and expert coach- ing. My special thanks to Juan Carlos Holgado, Coaches Committee Chairman and Pascal Colmaire, FITA Development Director for their great effort and knowledge to write and compile this manual. Best regards, Jim Easton President COACHING MANUAL ere is the first coaching manual of the Federation Internationale de Tir àl'Arc (FITA).
    [Show full text]
  • Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1St Edition)
    R O C K i n t h e R E S E R V A T I O N Songs from the Leningrad Rock Club 1981-86 Yngvar Bordewich Steinholt Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1st edition). (text, 2004) Yngvar B. Steinholt. New York and Bergen, Mass Media Music Scholars’ Press, Inc. viii + 230 pages + 14 photo pages. Delivered in pdf format for printing in March 2005. ISBN 0-9701684-3-8 Yngvar Bordewich Steinholt (b. 1969) currently teaches Russian Cultural History at the Department of Russian Studies, Bergen University (http://www.hf.uib.no/i/russisk/steinholt). The text is a revised and corrected version of the identically entitled doctoral thesis, publicly defended on 12. November 2004 at the Humanistics Faculty, Bergen University, in partial fulfilment of the Doctor Artium degree. Opponents were Associate Professor Finn Sivert Nielsen, Institute of Anthropology, Copenhagen University, and Professor Stan Hawkins, Institute of Musicology, Oslo University. The pagination, numbering, format, size, and page layout of the original thesis do not correspond to the present edition. Photographs by Andrei ‘Villi’ Usov ( A. Usov) are used with kind permission. Cover illustrations by Nikolai Kopeikin were made exclusively for RiR. Published by Mass Media Music Scholars’ Press, Inc. 401 West End Avenue # 3B New York, NY 10024 USA Preface i Acknowledgements This study has been completed with the generous financial support of The Research Council of Norway (Norges Forskningsråd). It was conducted at the Department of Russian Studies in the friendly atmosphere of the Institute of Classical Philology, Religion and Russian Studies (IKRR), Bergen University.
    [Show full text]
  • Download: Brill.Com/Brill-Typeface
    Poets of Hope and Despair Russian History and Culture Editors-in-Chief Jeffrey P. Brooks (The Johns Hopkins University) Christina Lodder (University of Kent) Volume 21 The titles published in this series are listed at brill.com/rhc Poets of Hope and Despair The Russian Symbolists in War and Revolution, 1914-1918 Second Revised Edition By Ben Hellman This title is published in Open Access with the support of the University of Helsinki Library. This is an open access title distributed under the terms of the CC BY-NC-ND 4.0 license, which permits any non-commercial use, distribution, and reproduction in any medium, provided no alterations are made and the original author(s) and source are credited. Further information and the complete license text can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/ The terms of the CC license apply only to the original material. The use of material from other sources (indicated by a reference) such as diagrams, illustrations, photos and text samples may require further permission from the respective copyright holder. Cover illustration: Angel with sword, from the cover of Voina v russkoi poezii (1915, War in Russian Poetry). Artist: Nikolai K. Kalmakov (1873-1955). Brill has made all reasonable efforts to trace all rights holders to any copyrighted material used in this work. In cases where these efforts have not been successful the publisher welcomes communications from copyright holders, so that the appropriate acknowledgements can be made in future editions, and to settle other permission matters. The Library of Congress Cataloging-in-Publication Data is available online at http://catalog.loc.gov Typeface for the Latin, Greek, and Cyrillic scripts: “Brill”.
    [Show full text]
  • Security Analysis of Instant Messenger Torchat
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Informatics Chair of Software Engineering Security Analysis of Instant Messenger TorChat Master's Thesis Student: Rain Viigipuu Student code: 072125 Supervisor: Alexander Norta, PhD External Supervisor: Arnis Parˇsovs, MSc TALLINN 2015 Abstract TorChat is a peer-to-peer instant messenger built on top of the Tor network that not only provides authentication and end-to-end encryption, but also allows the communication parties to stay anonymous. In addition, it prevents third parties from even learning that communication is taking place. The aim of this thesis is to document the protocol used by TorChat and to analyze the security of TorChat and its reference implementation. The work shows that although the design of TorChat is sound, its implementation has several flaws, which make TorChat users vulnerable to impersonation, communication confirmation and denial-of-service attacks. 2 Contents 1 Introduction 6 2 Tor and Hidden Services 8 2.1 Hidden Services . .9 2.1.1 Hidden service address . 11 3 TorChat 12 3.1 Managing Contacts and Conversations . 12 3.2 Configuration Options . 16 4 TorChat Protocol 17 4.1 Handshake . 17 4.2 File Transfers . 18 4.3 Protocol Messages . 19 4.3.1 not implemented . 19 4.3.2 ping . 20 4.3.3 pong . 21 4.3.4 client . 22 4.3.5 version . 22 4.3.6 status . 22 4.3.7 profile name . 23 4.3.8 profile text . 23 4.3.9 profile avatar alpha . 24 4.3.10 profile avatar . 24 4.3.11 add me.............................
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • Jul-Aug '17.Qxp
    Arch eryFoc us v21 n6 November 2017 $12 Tom Dorigatti The Games People Used to Play William Moltzan Making a Stabilizer Quick Disconnect Christ Waters Beating Buck Fever Bob Ryder Selecting Equipment for New Recurve Archers Markus Wagner Mental Training: Science or Just Gut Feelings? Steve Ruis Mindfulness or Mindlessness? Hugh D.H. Soar The Young Archer AER Staff Is Your Bow Too Heavy? New from the The WAF Coaching Library! TEACHING ARCHERY by Van Webster Running a Teaching Archery is a complete guide to setting up and oper - Recreational ating a public archery program. Whether teaching archery to kids at a camp, teaching archery to adults in a park, or running Archery Program an archery range at an archery pro shop, this how-to manual will give you all the information that you need to set up and operate your program successfully. Appendices of never before published information con - tain scripts and dialogs for instructors, class lesson plans, a glossary of terms, and useful forms that you can duplicate and use in your own class programs. This book is the one stop manual for building and main - taining an effective recreational archery program. Included are many of the ideas and techniques that have been used by Pasadena Roving Archers ( PRA ) to serve more than 10,000 recreational archers every year. The Watching Arrows Fly Coaching Library is a effort to supply archery coaches with a literature not just on the shoot - ing of arrows out of bows but on how to coach people to do that better. The Watching Arrows Fly Coaching Library The Principles of Coaching Archery, Vols 1 & 2 (2015) Teaching Archery (2015) Still More on Coaching Archery (2014) Larry Wise on Coaching Archery (2014) Archery Coaching How To’s (2013) Even More on Coaching Archery (2013) More on Coaching Archery (2010) Coaching Archery (2008) Available from Better Book Stores and Online Booksellers like Amazon.com editorial According to the Archery Trade Getting this issue out has been a while making shots and Tom Association telephone surveys bit of a roller coaster ride.
    [Show full text]
  • All Audio Songs by Artist
    ALL AUDIO SONGS BY ARTIST ARTIST TRACK NAME 1814 INSOMNIA 1814 MORNING STAR 1814 MY DEAR FRIEND 1814 LET JAH FIRE BURN 1814 4 UNUNINI 1814 JAH RYDEM 1814 GET UP 1814 LET MY PEOPLE GO 1814 JAH RASTAFARI 1814 WHAKAHONOHONO 1814 SHACKLED 2 PAC CALIFORNIA LOVE 20 FINGERS SHORT SHORT MAN 28 DAYS RIP IT UP 3 DOORS DOWN KRYPTONITE 3 DOORS DOWN HERE WITHOUT YOU 3 JAYS IN MY EYES 3 JAYS FEELING IT TOO 3 THE HARDWAY ITS ON 360 FT GOSSLING BOYS LIKE YOU 360 FT JOSH PYKE THROW IT AWAY 3OH!3 STARSTRUKK ALBUM VERSION 3OH!3 DOUBLE VISION 3OH!3 DONT TRUST ME 3OH!3 AND KESHA MY FIRST KISS 4 NON BLONDES OLD MR HEFFER 4 NON BLONDES TRAIN 4 NON BLONDES PLEASANTLY BLUE 4 NON BLONDES NO PLACE LIKE HOME 4 NON BLONDES DRIFTING 4 NON BLONDES CALLING ALL THE PEOPLE 4 NON BLONDES WHATS UP 4 NON BLONDES SUPERFLY 4 NON BLONDES SPACEMAN 4 NON BLONDES MORPHINE AND CHOCOLATE 4 NON BLONDES DEAR MR PRESIDENT 48 MAY NERVOUS WRECK 48 MAY LEATHER AND TATTOOS 48 MAY INTO THE SUN 48 MAY BIGSHOCK 48 MAY HOME BY 2 5 SECONDS OF SUMMER GOOD GIRLS 5 SECONDS OF SUMMER EVERYTHING I DIDNT SAY 5 SECONDS OF SUMMER DONT STOP 5 SECONDS OF SUMMER AMNESIA 5 SECONDS OF SUMMER SHE LOOKS SO PERFECT 5 SECONDS OF SUMMER KISS ME KISS ME 50 CENT CANDY SHOP 50 CENT WINDOW SHOPPER 50 CENT IN DA CLUB 50 CENT JUST A LIL BIT 50 CENT 21 QUESTIONS 50 CENT AND JUSTIN TIMBERLAKE AYO TECHNOLOGY 6400 CREW HUSTLERS REVENGE 98 DEGREES GIVE ME JUST ONE NIGHT A GREAT BIG WORLD FT CHRISTINA AGUILERA SAY SOMETHING A HA THE ALWAYS SHINES ON TV A HA THE LIVING DAYLIGHTS A LIGHTER SHADE OF BROWN ON A SUNDAY AFTERNOON
    [Show full text]
  • How Do Tor Users Interact with Onion Services?
    How Do Tor Users Interact With Onion Services? Philipp Winter Anne Edmundson Laura M. Roberts Princeton University Princeton University Princeton University Agnieszka Dutkowska-Zuk˙ Marshini Chetty Nick Feamster Independent Princeton University Princeton University Abstract messaging [4] and file sharing [15]. The Tor Project currently does not have data on the number of onion Onion services are anonymous network services that are service users, but Facebook reported in 2016 that more exposed over the Tor network. In contrast to conventional than one million users logged into its onion service in one Internet services, onion services are private, generally not month [20]. indexed by search engines, and use self-certifying domain Onion services differ from conventional web services names that are long and difficult for humans to read. In in four ways; First, they can only be accessed over the Tor this paper, we study how people perceive, understand, and network. Second, onion domains are hashes over their use onion services based on data from 17 semi-structured public key, which make them difficult to remember. Third, interviews and an online survey of 517 users. We find that the network path between client and the onion service is users have an incomplete mental model of onion services, typically longer, increasing latency and thus reducing the use these services for anonymity and have varying trust in performance of the service. Finally, onion services are onion services in general. Users also have difficulty dis- private by default, meaning that users must discover these covering and tracking onion sites and authenticating them. sites organically, rather than with a search engine.
    [Show full text]
  • Detection and Analysis of Tor Onion Services
    Detection and Analysis of Tor Onion Services Martin Steinebach1;∗, Marcel Schäfer2, Alexander Karakuz and Katharina Brandl1 1Fraunhofer SIT, Germany 2Fraunhofer USA CESE E-mail: [email protected] ∗Corresponding Author Received 28 November 2019; Accepted 28 November 2019; Publication 23 January 2020 Abstract Tor onion services can be accessed and hosted anonymously on the Tor network. We analyze the protocols, software types, popularity and uptime of these services by collecting a large amount of .onion addresses. Websites are crawled and clustered based on their respective language. In order to also determine the amount of unique websites a de-duplication approach is implemented. To achieve this, we introduce a modular system for the real-time detection and analysis of onion services. Address resolution of onion services is realized via descriptors that are published to and requested from servers on the Tor network that volunteer for this task. We place a set of 20 volunteer servers on the Tor network in order to collect .onion addresses. The analysis of the collected data and its comparison to previous research provides new insights into the current state of Tor onion services and their development. The service scans show a vast variety of protocols with a significant increase in the popularity of anonymous mail servers and Bitcoin clients since 2013. The popularity analysis shows that the majority of Tor client requests is performed only for a small subset of addresses. The overall data reveals further that a large amount of permanent services provide no actual content for Tor users. A significant part consists instead of bots, services offered via multiple domains, or duplicated websites for phishing Journal of Cyber Security and Mobility, Vol.
    [Show full text]
  • Privati Della Privacy Fabio Ginestri
    Privati della Privacy La nostra vita digitale quanto è pubblica? Fabio Ginestri Fabio Ginestri – Privati della Privacy Slide 1/34 “Controllo, controllo, controllo. Ogni giorno leggiamo sui giornali che i computer controllano qualcosa di nuovo. Credo che un giorno il governo collegherà tra loro tutti computer e ci terrà tutti sotto controllo, nessuno sarà più libero.” Intervista ad un passante inserita nel documentario “Quando l'Olivetti inventò il PC” Fabio Ginestri – Privati della Privacy Slide 2/34 Perché questo speech? Il programma di informazione Report trasmette “Il prodotto sei tu” sul mondo dei social network. Scaturiscono diversi ingiusti malumori nel mondo del web, accusando che il servizio è il solito mantra denigratorio della TV italiana contro il mondo di Internet Gli smartphone odierni gestiscono sempre più i nostri dati e forniscono servizi attraverso il cloud computing C'è una diffusa ignoranza su come utilizzare i social network e sui rischi provenienti da tale uso Recentemente si è scoperto che gli Stati Uniti d'America chiedono e ricevono dai big del settore informatico dati sui loro utenti Esistono alternative libere a molti servizi che già utilizziamo, i quali possono essere sovrabbondanti rispetto ai nostri bisogni e al contempo minare la nostra riservatezza Fabio Ginestri – Privati della Privacy Slide 3/34 Mettiamo in chiaro... Qui non si condanna il modello di business, si cerca di informare e di trasmettere ciò che in questi anni si ha visto, sentito raccontare e/o sperimentato in prima persona Si mettono in luce le criticità di certi servizi online, anche perché spesso è possibile trovare alternative più rispettose della libertà degli utenti e magari più funzionali Si cercano di illustrare alcune alternative libere, senza però entrare nei dettagli implementativi.
    [Show full text]