Estratto Dal Database .Onion Del 20 Marzo 2015 (151561 Pagine Offuscate)

Total Page:16

File Type:pdf, Size:1020Kb

Estratto Dal Database .Onion Del 20 Marzo 2015 (151561 Pagine Offuscate) Secondo corso informatico sulle reti anonime: gli indici di ricerca su rete Tor. Estratto dal database .onion del 20 marzo 2015 (151561 pagine offuscate) Utenti: Lauraghost69, Navytex, AnonyMe,LilyStealth92, NosNyM007. By Exodus1984, 28 marzo 2015, con aggiornamenti per la terza edizione del corso sulle reti anonime e cifrate del 29 marzo 2015. Lezione 1, corso reti anonime, seconda edizione, analisi dei siti offuscati su rete Tor. Oggetto: Seconda edizione, lezione 1: Filtraggio e analisi dei siti offuscati su rete Tor, impostare il filtro programma ed eseguire l'analisi informativa dei vari siti web seguenti. Eseguire una analisi informativa sui siti offuscati prescelti, e fornire una relazione scritta . Terza edizione, lezione 1: Creare un programma filtro per verificare l'esistenza e la validità dei seguenti indirizzi .onion su rete Tor, viene richiesta una analisi informativa dei dati seguenti con lo scopo di raccogliere informazioni valide per la creazione di un profilo informatico delle pagine offuscate, per costruire un database di ricerca avanzato. "aaData": [ [ "0", "torlinkbgs6aabns.onion", "TorLinks | .onion Link List The Hidden Wiki TheHiddenWiki Onion Urls onionland Tor linklist Deepweb", "https://encrypted.google.com/search?q=\".onion\"", "1423848650", "1369353102", "376", "1958" ],[ "1", "ci3hn2uzjw2wby3z.onion", "Talk.onion", "https://encrypted.google.com/search?q=\".onion\"", "1375548844", "1369353102", "393", "536" ], [ "2", "hpuuigeld2cz2fd3.onion", "DeepSearch Tor Search Engine", "https://encrypted.google.com/search?q=\".onion\"", "1375515033", "1369352430", "425", "299" ], [ "3", "dppmfxaacucguzpc.onion", "TORDIR - Link List", "https://encrypted.google.com/search?q=\".onion\"", "1388133170", "1369352964", "385", "2227" ],[ "4", "eqt5g4fuenphqinx.onion", "Core.onion ", "https://encrypted.google.com/search?q=\".onion\"", "1375530393", "1369352434", "369", "676" ], [ "5", "4eiruntyxxbgfv7o.onion", "none", "https://encrypted.google.com/search?q=\".onion\"", "1371915050", "1369352434", "394", "858" ], [ "6", "kpvz7ki2v5agwt35.onion", "Hello!", "https://encrypted.google.com/search?q=\".onion\"", "1424991785", "1369352450", "415", "3365" ],[ "7", "xqz3u5drneuzhaeo.onion", "Freedom Hosting", "https://encrypted.google.com/search?q=\".onion\"", "1375661793", "1369353009", "367", "1052" ], [ "8", "jhiwjjlqpyawmpjx.onion", "Tor Mail", "https://encrypted.google.com/search?q=\".onion\"", "1375649989", "1369352775", "403", "770" ], [ "9", "zw3crggtadila2sg.onion", "Null", "https://encrypted.google.com/search?q=\".onion\"", "1384095504", "1369352777", "396", "1890" ], [ "10", "jntlesnev5o7zysa.onion", "Download music, movies, games, software! The Pirate Bay - The galaxy's most resilient BitTorrent site", "https://encrypted.google.com/search?q=\".onion\"", "1396250669", "1369352780", "437", "1382" ],[ "11", "f3ew3p7s6lbftqm5.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369352780", "343", "344" ], [ "12", "torhostg5s7pa2sn.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369377311", "364", "2280" ], [ "13", "sms4tor3vcr2geip.onion", "Secure Messaging System for TOR", "https://encrypted.google.com/search?q=\".onion\"", "1424988081", "1369352879", "411", "511" ], [ "14", "am4wuhz3zifexz5u.onion", "The (Ultimate) Tor Library - am 4w uh z3 zi fe xz 5u dot onion - serving fine litterature since 2008", "https://encrypted.google.com/search?q=\".onion\"", "1423872197", "1369352886", "438", "2316" ], [ "15", "printorp6rxgnyur.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369352886", "392", "9" ],[ "16", "yt6zylmoblq5pwiv.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369352886", "373", "100" ], [ "17", "bj6sy3n7tbt3ot2f.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369352886", "336", "141" ], [ "18", "3fyb44wdhnd2ghhl.onion", "Null", "https://encrypted.google.com/search?q=\".onion\"", "1424879106", "1369352930", "370", "347" ], [ "19", "hbpvnydyyjbmhx6b.onion", "torservers.net - Tor Exit Node & Bridge hosting", "https://encrypted.google.com/search?q=\".onion\"", "1393982615", "1369352932", "385", "248" ], [ "20", "utovvyhaflle76gh.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353285", "368", "1806" ], [ "21", "dkn255hz262ypmii.onion", "Silk Road forums - Index", "https://encrypted.google.com/search?q=\".onion\"", "1386655828", "1369352948", "408", "1875" ], [ "22", "od6j46sy5zg7aqze.onion", "Anonchan", "https://encrypted.google.com/search?q=\".onion\"", "1375650661", "1369352957", "384", "1711" ], [ "23", "hvieybi6rb45wfpg.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369352963", "324", "105" ], [ "24", "silkroadvb5piz3r.onion", "\n\t\t\tlogin | Silk Road\n\t\t", "https://encrypted.google.com/search?q=\".onion\"", "1380712751", "1369352969", "443", "2248" ], [ "25", "shxdhomhggy3bjrn.onion", "wlcm 2 my e-h0me", "https://encrypted.google.com/search?q=\".onion\"", "1375294534", "1369352969", "403", "163" ], [ "26", "3suaolltfj2xjksb.onion", "TriPh0rce", "https://encrypted.google.com/search?q=\".onion\"", "1375680440", "1369353398", "427", "1487" ], [ "27", "nstmo7lvh4l32epo.onion", "none", "https://encrypted.google.com/search?q=\".onion\"", "1372795959", "1369353398", "395", "1393" ], [ "28", "p43g3uyr4dhneura.onion", "Nekro's Onion #Dwelling# :: Index", "https://encrypted.google.com/search?q=\".onion\"", "1375294908", "1369352999", "406", "178" ], [ "29", "redditqlrzb7rrsy.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353002", "361", "119" ], [ "30", "5onwnspjvuk7cwvk.onion", "BlackMarket Reloaded - Gateway finder", "https://encrypted.google.com/search?q=\".onion\"", "1386615109", "1369353005", "391", "1983" ], [ "31", "xfq5l5p4g3eyrct7.onion", "Index of /", "https://encrypted.google.com/search?q=\".onion\"", "1375321813", "1369353437", "412", "349" ], [ "32", "isax7s5yooqgelbr.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353437", "364", "68" ], [ "33", "4344457357774542.onion", "none", "https://encrypted.google.com/search?q=\".onion\"", "1371986196", "1369353437", "416", "127" ], [ "34", "fkyvwpu7ccsorke2.onion", "noreason", "https://encrypted.google.com/search?q=\".onion\"", "1414479777", "1369353024", "393", "1751" ], [ "35", "wjngphmzk6mr2pt5.onion", "Narcan", "https://encrypted.google.com/search?q=\".onion\"", "1375692598", "1369353037", "410", "191" ], [ "36", "mtn2fcv7yerki2op.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353037", "386", "101" ], [ "37", "pdjcu4js2y4azvzt.onion", "TM Comm", "https://encrypted.google.com/search?q=\".onion\"", "1375308890", "1369353098", "436", "260" ], [ "38", "wyxwerboi3awzy23.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353098", "376", "1593" ], [ "39", "xmh57jrzrnw6insl.onion", "TORCH: Tor Search!", "https://encrypted.google.com/search?q=\".onion\"", "1424988069", "1369353098", "428", "1078" ], [ "40", "2ddjd7xsni7pefcx.onion", "PURE EUROPE", "https://encrypted.google.com/search?q=\".onion\"", "1372076429", "1369353144", "439", "276" ], [ "41", "zgmxllflvb7oza7t.onion", "Dear PayPal", "https://encrypted.google.com/search?q=\".onion\"", "1373630588", "1369353158", "394", "207" ], [ "42", "p7d2k2xiioailnuu.onion", "", "https://encrypted.google.com/search?q=\".onion\"", "1372906010", "1369353164", "427", "287" ],[ "43", "k6gsb4ibatcico35.onion", "none", "https://encrypted.google.com/search?q=\".onion\"", "1372065696", "1369353164", "445", "281" ], [ "44", "3terbsb5mmmdyhse.onion", "hashparty ~ password cracking", "https://encrypted.google.com/search?q=\".onion\"", "1374276352", "1369353199", "389", "461" ], [ "45", "qubsrxat5qsaw5u5.onion", " Polska Cebulka", "https://encrypted.google.com/search?q=\".onion\"", "1375650708", "1369353199", "369", "263" ], [ "46", "nel2xugswcy7qv7r.onion", "undefined", "https://encrypted.google.com/search?q=\".onion\"", "-1", "1369353199", "393", "218" ], [ "47", "uaga3aoawaj6hohg.onion", "Index of /", "https://encrypted.google.com/search?q=\".onion\"", "1375543906", "1369353280", "385", "263" ], [ "48", "mobil7rab6nuf7vx.onion", "Mobile Store - Best unlocked cell phones - Buy apple and samsung phones with Bitcoin", "https://encrypted.google.com/search?q=\".onion\"", "1423645197", "1369353290", "427", "372" ], [ "49", "hq3hmoa4thdplmta.onion", "Heidenwut \u203b Politics, Occultism, Spy vs Spy, Revolution!!", "https://encrypted.google.com/search?q=\".onion\"", "1375650045", "1369353300", "420", "259" ], [ "50", "dts563ge5y7c2ika.onion", "OnionWarez * all what you want!", "https://encrypted.google.com/search?q=\".onion\"", "1375012394", "1369353318", "417", "1417" ], [ "51", "pw5odgnkkhsuslol.onion", "TaPE", "https://encrypted.google.com/search?q=\".onion\"", "1375639353", "1369353323", "406", "1214" ], [ "52", "vjelr2xdaqsgslzr.onion", "Wiadomo\u015b\u0107 forum - Torowisko", "https://encrypted.google.com/search?q=\".onion\"", "1375660401", "1369353339", "411", "2094" ], [ "53", "abbujjh5vqtq77wg.onion", "Onion Identity Services - Get your fake passport and a new identity today", "https://encrypted.google.com/search?q=\".onion\"", "1424870884", "1369353345", "407", "357" ], [ "54", "hv2ow7li345lki5w.onion", "none", "https://encrypted.google.com/search?q=\".onion\"", "1372066039", "1369353345", "417", "186" ], [ "55", "2dn2dmxt5uwnxz3j.onion", "Abusos judiciales en
Recommended publications
  • Privacy in Atlantis*
    Harvard Journal of Law & Technology Volume 18, Number 1 Fall 2004 PRIVACY IN ATLANTIS* Jerry Kang & Benedikt Buchner** TABLE OF CONTENTS INTRODUCTION.................................................................................230 SCENE I: PRIVACY’S FORM...............................................................231 A. Market-Talk..............................................................................231 B. Dignity-Talk .............................................................................234 SCENE II: PRIVACY’S SUBSTANCE....................................................236 A. The Core Similarities ...............................................................237 1. Dignity’s Consent (or the Market’s Initial Allocation) .........237 2. Data Protection Regulations (or Intangible Property Regulations) ....................................................................240 B. Too Little Control.....................................................................244 1. The Problem: Hard Choices ..................................................244 2. The Response: Fortifying the Individual...............................246 C. Too Much Control....................................................................251 1. The Problem: Societal Overrides ..........................................251 2. The Response: Interest Balancing .........................................252 CONCLUSION ....................................................................................255 APPENDIX .........................................................................................257
    [Show full text]
  • JW Apostate Reply Supporting Motion to Quash April 6Th
    Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 1 of 21 1 JANE / JOHN DOE 2 Email: [email protected] 3 4 Pro se 5 IN THE UNITED STATES DISTRICT COURT FOR THE 6 SOUTHERN DISTRICT OF NEW YORK 7 8 IN RE: DMCA SUBPOENA TO GOOGLE, LLC Case No.: 7:20-mc-00119 9 10 JANE / JOHN DOE’S REPLY IN SUPPORT OF THE OBJECTION AND MOTION TO 11 QUASH DMCA SUBPOENA 12 13 A. INTRODUCTION 14 15 While it is true that Jehovah’s Witnesses are well known for their distribution of 16 Bible based books and publications, they are also a notorious group of criminal 17 pedophiles running a scam “religion” who are guilty of abuse of process and emotional 18 19 extortion through sham litigation in their pathetic efforts at discovering leaks and 20 moles and whistleblowers. Unfortunately for them, this is the year 2020 and things 21 22 like VPNs, anonymous proxies, and TOR exit nodes frustrate them at every turn. 23 Whether one is known as Darkspilver or John Redwood or JW Apostate, or any 24 number of other pseudonyms, it does not really matter as we are all Spartacus in this 25 26 fight! Reporting on and exposing to public comment and ridicule the doctrinal 27 inconsistencies and reversals, failed predictions, mistranslation of the Bible, harsh 28 JANE / JOHN DOE’S REPLY IN SUPPORT OF OBJECTION AND MOTION TO QUASH DMCA SUBPOENA- 1 Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 2 of 21 1 treatment of former members and autocratic and coercive leadership (not to mention 2 the child raping!) is a public duty that Jane / John Doe takes extremely seriously at 3 1 great personal risk.
    [Show full text]
  • Nor'easter News Volume 2 Issue 5
    Established 2007 N ...........R'EASTER NEWS Make a Dif­ Setting the Re­ ference, Be a cord Straight Mentor on Housing BY ANDREW FREDETTE BY MICHAEL CAMPINELL Nor'easter Staff Nor'easter Staff Have you ever wondered Right after the hous­ what it would be like to have a ing selection for the 2009 - 2010 mentor when you where growing school year happened, rumors up? Wonder what the experience starting spreading like wildfire. might do for you and the experi­ This article is to help set those ru­ ence you might gain? Growing mors straight. Information in this up is a part of life that not ev­ article was received from Jennifer eryone wants to do. But there are Deburro-Jones, the Director oJ ways to revert to your child hood Residential Life at UNE. She and and feel like a kid again. UNE is I have spoke on several occasions running a mentor program with about the many different aspects the College Community Men­ of housing at UNE and she has toring Program. also sent me answers to specific The program consists of 55 questions about the housing se­ mentors right now who are all lection process and what is hap­ UNE students, and the group of TY GOWEN, NOR'EASTER NEWS pening next year. BUSH CENTER: George H.W. and Barbara Bush address UNE at the dedication ceremony on October 3, 2008. children they work with are any One of the first rumors is that where from kindergarten all the housing selection numbers are way to 8th grade. The age of the International Center not actually random.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Longitudinal Analysis of Misuse of Bitcoin⋆
    Longitudinal Analysis of Misuse of Bitcoin? Karim Eldefrawy1, Ashish Gehani1, and Alexandre Matton2?? 1 SRI International, USA 2 Stanford University, USA Abstract. We conducted a longitudinal study to analyze the misuse of Bitcoin. We first investigated usage characteristics of Bitcoin by analyz- ing how many addresses each address transacts with (from January 2009 to May 2018). To obtain a quantitative estimate of the malicious activity that Bitcoin is associated with, we collected over 2.3 million candidate Bitcoin addresses, harvested from the dark web between June 2016 and December 2017. The Bitcoin addresses found on the dark web were la- beled with tags that classified the activities associated with the onions that these addresses were collected from. The tags covered a wide range of activities, from suspicious to outright malicious or illegal. Of these addresses, only 47,697 have tags we consider indicative of suspicious or malicious activities. We saw a clear decline in the monthly number of Bitcoin addresses seen on the dark web in the periods coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are more likely to be involved in mixing transactions. To identify mixing transactions, we developed a new heuristic that extends previously known ones. We found that Bitcoin addresses found on the dark web are significantly more ac- tive, they engage in transactions with 20 times the neighbors and 4 times the Bitcoin amounts when compared to random addresses.
    [Show full text]
  • Cyber Influence Campaigns in the Dark Web
    Cyber Influence Campaigns in the Dark Web Lev Topor and Pnina Shuker In recent years there has been a significant rise in the scope and intensity of information wars between the great powers and other forces in the international arena, and influence campaigns have become a legitimate tool in the hands of politicians, propagandists, and global powers. In this context, the professional literature has focused most on campaigns on social networks while it has almost ignored similar campaigns in the Dark Web where the current research tends to focus on criminal activity. The Dark Web was developed by the American Navy for intelligence purposes and was then promoted by the West as a public tool to protect privacy and anonymity. Today it provides fertile ground for deliberate leaks by countries that do not wish to publish certain information in the traditional media. These leaks are perceived as authentic, leading the media and other intelligence organizations to swallow the bait and investigate, and in some cases they even change their operations accordingly. The purpose of this article is to present the way in which the Dark Web is used in influence campaigns, particularly through deliberately leaking information. Keywords: Dark Web, influence campaigns, propaganda, information wars, disinformation Dr. Lev Topor is a senior strategic advisor and researcher on racism and cyber. Pnina Shuker is a Neubauer Research Fellow at the Institute of National Security Studies. Cyber, Intelligence, and Security | Volume 3 | No. 2 | October 2019 63 LEV TOPOR AND PNINA SHUKER | CYBER Influence Campaigns IN THE DARK WEB 64 Introduction In January 2019, tens of thousands of documents and emails from senior Russian government officials, leaders of the Russian Orthodox Church, and Russian oligarchs were leaked to the Dark Web.
    [Show full text]
  • Full 8Chan Leak Dump As of April-15-2015 This Is a Quick Overview of Quick Leak
    Full 8chan Leak Dump As Of April-15-2015 This is a quick overview of Quick Leak http://8ch.net/leaked/index.html Anonymous Post Makes News Headline! KILLCEN 04/15/15 (Wed) 15:09:40 No.235[Repl y][Watch Thread] LoL! Hey Anonymous! You made news coverage! http://www.cbsnews.com/news/top-law-officials-personal-information-posted-online -right-wing-group-blamed/ DHS-CIA-FBI TRAITORS HOME ADDRESSES: http://quickleak.ir/xiUw8SIv Infowars also covers dox KILLCEN 04/15/15 (Wed) 15:19:3 2 No.236 Holly Molly! Infowars posts report about this too! (I'd l ay low if I were you, for a while) http://www.infowars.com/leaking-of-government-officials-ad dresses-accompanied-by-note-warning-of-fema-crackdown-by-nwo-satanists/ PREPARATION FOR MARTIAL LAW DOWNLOAD LINKS Anonymous 04/15/15 (Wed) 14:51:11 No .234[Reply][Watch Thread] CONCENTRATION CAMPS FOR AMERICANS FREE PDF DOWNLOAD Concentration Camps for Americans How would you like to enter one the over 600 American concentration camps acros s the USA? The barbed wired, shackle embedded camps have been built and are awaiti ng to enslave huge numbers of the population. Should a fitting event take place, current laws allow FEMA to legally incarcerate civilians into these camps. The Federal Government admits plans to detain millions of people Rex 84, short for Readiness Exercise 1984, was a plan by the United States fede ral government to test their ability to detain large numbers of American citizens in case of massive civil unrest or national emergency.
    [Show full text]
  • Says a Friend of Benthall's
    54 I At 3:15 P.M. on October 1, 2013, Ross Ulbricht’s career as a drug kingpin came to an end in the science- fiction section of San Francisco’s Glen Park Library. The 29-year- old had walked up the steps just inside the modern stone building, passed the librarian working at the circula- tion desk and taken a seat at a far corner table near a window. It was a sunny day, but the small community library was filled with people. Ulbricht, with his easy smile and thick mop of brown hair, was dressed in blue jeans web of lies_ AN UNDERGROUND, ANONYMOUS INTERNET— THE DEEP WEB—IS THE LAST LAWLESS FRONTIER ON EARTH. BUT NOTHING COULD SAVE ITS KINGPINS FROM THE PAINFUL CONSEQUENCES OF HUMAN ERROR BY JOSHUA HUNT and a T-shirt. The hand- ful of people reading and wandering among rows of novels nearby weren’t dressed much differently, but beneath their shirts and jackets they wore vests that identified them as FBI agents. Until the moment they rushed Ulbricht, pushing him up against a window to handcuff him as other agents seized his laptop before he could lock it down, nobody suspected anything out of place. The cuffs went on and a small crowd gathered, but Ulbricht just looked out at the afternoon sun. Ulbricht was an educated person, with a master’s degree in 55 materials science and engi- neering from Penn State. He was a good son from a good Texas family, an un- likely addition to the list of men who had changed the shape and scale of drug distribution in Amer- ica.
    [Show full text]
  • Technical and Legal Overview of the Tor Anonymity Network
    Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5
    [Show full text]
  • Deepweb and Cybercrime It’S Not All About TOR
    A Trend Micro Research Paper Deepweb and Cybercrime It’s Not All About TOR Vincenzo Ciancaglini, Marco Balduzzi, Max Goncharov, and Robert McArdle Forward-Looking Threat Research Team Trend Micro | Deepweb and Cybercrime Contents Abstract ..................................................................................................................................................3 Introduction ...........................................................................................................................................3 Overview of Existing Deepweb Networks ......................................................................................5 TOR ............................................................................................................................................5 I2P ...............................................................................................................................................6 Freenet .......................................................................................................................................7 Alternative Domain Roots ......................................................................................................7 Cybercrime in the TOR Network .......................................................................................................9 TOR Marketplace Overview ..................................................................................................9 TOR Private Offerings ..........................................................................................................14
    [Show full text]
  • Quase 700 Sites Onion, a MAIORIA ESTÁ ONLINE
    Quase 700 sites onion, A MAIORIA ESTÁ ONLINE (ALGUNS NÃO SÃO 24HRS ONLINE) APROVEITE, TENHA CAUTELA A VISITAR SITES SEM LEGENDA, NÃO SABEMOS O QUE É OU O QUE V AI ENCONTRAR EU NÃO TESTEI TODOS OS SITES, OBVIAMENTE. http://2222243pi3jvhgnt.onion/ The Nowhere Server (restored from FH) http://222224h72gngmbr4.onion/ The Nowhere Server (restored from FH) http://2222266ahj25j5j2.onion/ The Nowhere Server (restored from FH) http://2223t4sermipwasm.onion/ The Nowhere Server (restored from FH) http://23tjl3xpt5btiqms.onion/ W38M411 - Login http://25ffhnaechrbzwf3.onion/ NL Growers - Coffee Shop grade Cannabis from the Netherlands - Weed, Hash, Marijuana, Cannabis for Bitcoins http://2atptz66l5aepcbj.onion/ Hacktivisme libre http://2bicbge75gy5xjso.onion/ Sam's Drug Store http://2cmg43zpfbelgwlw.onion/ http://2fqgjzbb2h7yevom.onion/ http://2gxxzwnj52jutais.onion/ The Nowhere Server (restored from FH) http://2jv5r7k66ralyk3g.onion/ http://2kcreatydoneqybu.onion/ Einloggen http://2kka4f23pcxgqkpv.onion/ Euro Guns - Number one guns dealer in onionland - Buy guns and ammo for Bitcoin. http://2ogmrlfzdthnwkez.onion/ Rent-A-Hacker - Hire a hacker for every job you c an imagine, from DDOS to completely ruining people or destroy reputation of a co mpany or individual http://2oztyiaxrr3vijwe.onion/ Index of / http://2pdkdy3eo552mpiz.onion/ http://2q4ryi45p6har5w2.onion/ I2P Downloads from kytv http://2qhtfzoxe24d5gxe.onion/ System Setup Required http://2qtnwm3zdbn52nxt.onion/ Hidden Service #6 http://2r2tz6wzqh7gaji7.onion/ KAVKAZ CENTER http://2xtsq3ekkxjpfm4l.onion/
    [Show full text]
  • Smooth As Silk: the Story of the Internet's Largest Drug Marketplace
    Smooth as Silk: The Story of the Internet's Largest Drug Marketplace Krzysztof Danielewicz [email protected] Mentor: Ming Chow Abstract On October 2 2013, the largest illegal online marketplace in the world was shut down by the FBI, and its founder arrested. Ross William Ulbricht, the “Dread Pirate Roberts” and founder of Silk Road, had spent 2½ years escaping the efforts of the United States Government to take down his creation, with great success. During this time, Silk Road offered the ability to solicit and purchase a staggering number of blatantly criminal substances and services within minutes, from practically anywhere in the world: it was well known as “the Amazon.com of illegal drugs.” Silk Road was run through Tor, a service which offers online anonymity and security. Which brings the question: how did the FBI manage to take down a supposedly anonymous online drug empire, arrest its owner, and seize over $3 million in Bitcoin? Will these actions by the United States Government make a significant difference in the online proliferation of illegal goods, or do the alternatives to Silk Road (already in full swing) make their efforts fruitless? And do these alternatives suffer from the same vulnerabilities that took down Ulbricht? This paper will explore the above questions and discuss the implications of this take down on illegal trade over the internet and, more generally, the anonymity and potential flaws of the Tor network as it exists today. To The Community Silk Road and Tor showcase a side of the Internet that is not well known to the general public, but is nonetheless a growing force in the proliferation of illegal goods worldwide.
    [Show full text]