Dr. BOTMAN – Telegram
Dr. BOTMAN
52 subscribers
2.75K photos
925 videos
169 files
3.04K links
eagle eye
horus eye
instagram.com/METALIVESMATTER
@armintrump
Owner:ArminSattari‌
‌t.me/BotMan/10241‌
Download Telegram
*تله نتانیاهو*

نتانیاهو سالها دنبال متقاعد کردن آمریکا و اروپا برای حمله به ایران بود ولی هر بار سرخورده می شد؛ آیا این بار موفق شد؟

در روز بعد از واقعه یازده سپتامبر ۲۰۰۱، روزنامه کیهان شریعتمداری، این بیمار مالیخولیائی، مقاله ای با تیتر:
*آغازی بر پایان آمریکا*
در کیهانِ بی رونق که پایگاه عملیات روانی نیروهای اطلاعات کشور است؛ به چاپ رساند؛ کلی در آن مقاله اراجیف بافت؛ اکنون ۲۲ سال از آن واقعه‌ می گذرد؛ آیا آمریکا پایان یافت؟ دروغ و هیاهوی کیهان از اول هم‌معلوم بود و تنها چهار تا جاهلِ کم عقلِ ساده لوح از خواندن آن مشعوف شدند؛ کیهان حتی در نسخه بعدی اش، تهرانی هایی‌ را که در یک مراسم سمبولیکِ کوچک؛ برای قربانیان آن حادثه شمع روشن کرده بودند؛ تحقیر کرده و مزدور و خائن نامید. آمریکا در جریان پس از یازده سپتامبر ، نه تنها نابود نشد؛ بلکه آرایش امنیتی جهان را تقویت کرده و هژمونی قوی تری علیه خاور میانه تشکیل داد و عراق را نابود و تصرف کرد و حتی برای عراق، حاکم آمریکائی تعیین و منصوب کرد؛ علاوه بر نفت و منابع اقتصادی آن را مصادره کرد و فروخت؛ بلکه آثار باستانی منحصر به فردِ عراق را به امریکا انتقال داد. امریکا افغانستان را اشغال و بن لادن رهبر القاعده را نابود کرد؛ آرایش سیاسی خاور میانه را عوض کرد. کردستان عراق را مرکز سیا و موساد و پایگاه نظامی خود و مرکز کنترل ترکیه و ایران و ... قرار داد.
اکنون هم کیهان پس حمله کورِ و کم اثر ولی قابل توجه در اشل حماس؛ مقاله ای با عنوان:
*مرگِ اسراییل*
را چاپ کرد و رجزها خواند؛ رجز هایی که اعراب بدوی در جنگهای تن به تن در صحرای نجد و حجاز در قرون و اعصار قدیم می خواندند.
*بنظر می رسد، همانند یازده سپتامبر که القاعده دست پرورده خودِ آمریکا و صدام در تله سیا افتاده بودند، این حرکتِ حماس و ایران، تله موساد است تا برای همیشه از شرِ محورِ مقاومت و ایران خلاص شود. این بار مظنون فقط ایران است؛ نه صدامی هست که جورج بوش بر او بغرّد؛ و نه بن لادنی که آمریکا در غارهای "تورا بورا" بدنبالش بگردد؛ این بار آدرس سر راست است؛ ابتدا مراکز هسته ای ایران و بعد تهران و اصفهان و...*
*در تلهِ تل آویو، هدف حماس نیست؛ بلکه جمهوری اسلامی ایران است، متاسفانه پرداخت هزینه آن بدوش مردم مظلوم ایران است که در ظلم مضاعف گرفتار خواهند شد. آنها نه تنها باید با جان و مال و زندگی فررندانش‌ این خسارت را بپردازند؛ بلکه به ظنِ قوی ایران راهم باید شرحه شرحه ببینند و ناظر باشند که آمریکا چگونه طومار تاریخ ۲۵۰۰ ساله ایران را می پیچد! در عراق آمریکا فقط به خودمختاری کردها بسنده کرد ولی در ایران بعید می دانم، به تغییرات محدود بسنده کند. مطمئناً تمام تاول ها و دمل های قومی و مذهبی از بلوچستان سنی مذهب تا کردستان و خوزستان و آذربایجان ها و...سر باز کرده و همه سلولهای سرطانی فعال خواهند شد و آمریکا هم تلاش می کند تا آرزوی دیرینه خود را در اجرای طرح خاورمیانه جدید جامه عمل‌ بپوشاند.*

آیا این بود که دنیا و آخرت ما هر دو آباد شوند؟ اکنون وضع ایتالیا در "پسا موسولینی" و فیلم‌ "دزد دوچرخه" در ذهنم تجسم می شود؛ جنگهای داخلی یوگسلاوی و کشتار سربرنیتسا و تشکیل کشور های شش گانه کوچک در پهنه یوگسلاوی سابق در اروپای شرقی تداعی می شود.
*آیا آدم عاقلی در کشور ما هست که بتواند چون فروغی و قوام کشور و جان ملت را نجات دهد؟*
-2147483648_-217721.jpg
71 KB
Proton Vibes
DJ Phellix
عطرت را
روى طاقچه‌ی این سطر
جا گذاشته‌ای،
شعر
هوای تو را دارد…


♥️🍷
@best_energetic_music
±‌
Forwarded from super idol "👽" (BBIBwSE.img (520×347) https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_347%2Cw_520%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//img-s-msn-com.akamaized.net/tenant/amp/entityid/BBIBwSE.img%3Fh%3D630%26w%3D1200%26m%3D6%26q%3D60%26o%3Dt%26l)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from @BotMan Baphomet
This media is not supported in your browser
VIEW IN TELEGRAM
"
OnionScan Report June 2016 - Snapshots of the Dark Web
Welcome to the third OnionScan Report. The aim of these reports is to provide an accurate and up-to-date analysis of how anonymity networks are being used in the real world.

In this report we will deliver some insights into how onion services are related to each other, through hosting, shared links and other identity correlations.

Summary
The dark web is more connected than previously thought. The classical portrayal of onion services is that of a lone, focused website unconnected to anything else. However, we show that a large proportion of sites can be connected to each other by following hyperlinks - even when we discount directory and wiki sites from our analysis.

We also show how site relationships between seemingly unrelated sites can be outed though link graph analysis.

Further, by using other identity correlations e.g. ssh fingerprints, we can make estimates on the number of unique web servers, demonstrating that even when sites don't link each other, they can be connected by other means.

A Note on Numbers
The lifespan of an onion service can range from minutes to years. When providing generalized numbers, especially percentages, we report approximate figures based on multiple scans over a period of time, rather than a single snapshot.

The Dark Web is Highly Connected
Note on Images: The graphs displayed in this article are transitive reductions of the actual graphs that we constructed. Transitive reductions simplify the number of edges in the graph while preserving connectivity - that is why the graphs sometimes have odd features off long "strings" of connections - in reality all these nodes are connected to each other - but it is hard to create graphs that convey this information without looking cluttered!

When we examine the connections between Onion Services we find that most of the services we scan are actually connected to a large proportion of the rest of the service we scan. The most direct from of these links come from wikis and other link directories however and these aren't that interesting.

Instead, we examined links from sites with less than 20 outgoing links - this removes the link directories from our analysis an allows us to look at more concrete relationships between sites.

As well as links (green) we also looked at relationships detected through SSH public keys (blue), ftp banners (pink) and Apache mod_status leaks (red). SMTP banners were also inspected but only a single small cluster could be identified.

Below is the largest cluster from the June 2016 scan. We found that this large cluster contained ~50% of all scanned sites - most connected through web links, but with a significant number connected through SSH keys and FTP banners.



Many other clusters, like the one below, are small. However, even these clusters have good connectivity suggesting the presence of many active subcommunities.



Outing Relationships through Link Analysis
While much of the web is connected, some sites are more connected than others.

Take a look at the image below. The image shows a small cluster of 19 nodes. These nodes, when we exclude directories and wikis, only link to each other in the pattern showed in the image.



There are several kinds of clusters than can be easily identified. When the links to and from an onion service are closed off to the larger web, the sites, ironically, stand out.

Estimating the Infrastructure of the Dark Web
Perhaps one of the most immediate insights from the above is that the dark web is smaller than previously estimated.

We have previously reported that Freedom Hosting II accounts for ~20% of all active onion sites - we are able to determine this because all of these sites present the same SSH public key - indicating they share the same infrastructure - the same as Freedom Hosting II.

We are able to make other connections. For example by linking FTP Banners we have been able to identify another cluster of 60 sites which all share an identical FTP banner (including an internal IP address leak) - we have been
able to link this to another web hosting provider.

Thus we can place some bounds on the number of unique hosting providers being used:

Of the ~5600 active sites that we scanned during June - 23% shared a single unique SSH Key - linking them to Freedom Hosting II.

1% can be attributed to the hosting provider we talked about above via FTP.



We were able to identify another 9 clusters of sites which could be linked through SSH keys - another 2.5% of sites.


Through Apache mod_status leaks we were able to identify another 10 clusters of sites sharing hosting infrastructure, another 1% of sites.
Therefore only 21 infrastructure setups account for 27% (~1500) of all active Onion Services!

If we assume the relationships we identified in the previous section also leak co-hosting information we can push this estimate to ~30 setups accounting for 30-35% of all Onion Services!

It is important to iterate that these numbers don't mean that 35% of Onion Services are operated by one of 30 groups - but that they are likely hosted by one of those groups - and remember, these are only the relationships we have been able to discern from rather trivial correlations - there are likely many more.

This lack of diversity in hosting infrastructure is concerning - it places the future of a large proportion of Onion Services in the hands of a limited number of groups.

Other OnionScan News
We have a new home - mascherari.press. All future OnionScan reports will be published here, as well as lots of other articles and discussions about anonymity and privacy.
OnionScan now supports XMPP thanks to Scott Ainslie!
OnionScan was included in ArchStrike Linux! We are super excited that this tool reaching more people in the security community.

Get Involved
If you would like to help please get in touch at team@onionscan.org.

Goals for the OnionScan Project
Increase the number of scanned onion services - We have so far only successfully scanned ~5000 (out of ~11,000 domains scanned).
Increase the number of protocols scanned. OnionScan currently supports light analysis for HTTP and SSH, and detection analysis for FTP, SMTP, Bitcoin, IRC, XMPP and Ricochet - we want to grow this list, as well as provide deeper analysis on all protocols.
Develop a standard for classifying onion services that can be used for crime analysis as well as an expanded analysis of usage from political activism to instant messaging.
TAGS
onions onionscan reports tor hidden services
SHARE


ABOUT THE AUTHOR
Sarah is an Independent Anonymity & Privacy Researcher. She maintains the @OnionScan project. PGP:0xFEA818621D9905DC ricochet:qn6uo4cmsrfv4kzq

@SarahJamieLewis Vancouver Website More posts
ONIONSCAN
OnionScan Report: May 2016 - Technologies used by Onion Services
SARAH JAMIE LEWIS 03 Jun 2016

ONIONS
Thwarting Identity Correlation Attacks
SARAH JAMIE LEWIS 05 Jul 2016



Mascherari Press is an organization that publishes insights on anonymity & privacy to understand how they impact those that rely on them, and to learn how to build better tools to empower people.


PROJECTS
OnionScan is a free and open source tool for investigating the Dark Web.

Queer Privacy is a collection of essays about community, family, coming out, dating, domestic violence, activism, sex work and suicide and how these parts of life influence, impact and change the way we think about privacy.

SUPPORT US!
Our projects would not be possible without you. Please consider supporting us.

HIRE US!
Have an interesting research problem? Want an in-depth security analysis in a challenging area? Get in touch with our research team.

WRITE FOR US!
If you have something you would like us to cover or would like to pitch us on a story please email editors@mascherari.press.

© Copyright 2017 Mascherari Press. All rights reserved.

"
https://mascherari.press/onionscan-report-june-2016/#:~:text=OnionScan%20Report%20June,All%20rights%20reserved.
👍1

OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime

Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
Forwarded from Dr. BOTMAN (@BotMan Baphomet)

OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime

Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
Media is too big
VIEW IN TELEGRAM
fc5fd9111098493495a155b405021ebf55482809-144p.mp4
Forwarded from Collectoruz
🚀 Rocket-чек на 37.74 USDT (37.7$)

Внутри чека: 1258 активация(й) по 0.02 USDT (0.02$) с реферальной наградой 0.01 USDT (0.01$)
💋1
01_The-Most-Spoken-Language-Besides-English-Spanish-in-Every-State-1848x2048.png (1848×2048)
Forwarded from Azazel News (Aries)
This media is not supported in your browser
VIEW IN TELEGRAM
Paralysis At London Station As Pro-Palestine Protesters Stage Sit-In

London Liverpool Street Station Is currently in chaos as protesters demand a ceasefire on Gaza.
Forwarded from Trump Chat 2️
Forwarded from Miles Black
Media is too big
VIEW IN TELEGRAM
СПЕЦИАЛЬНАЯ ВОЕННАЯ ОПЕРАЦИЯ

SPECIAL MILITARY OPERATION
@battleinsightsRU