able to link this to another web hosting provider.
Thus we can place some bounds on the number of unique hosting providers being used:
Of the ~5600 active sites that we scanned during June - 23% shared a single unique SSH Key - linking them to Freedom Hosting II.
1% can be attributed to the hosting provider we talked about above via FTP.
We were able to identify another 9 clusters of sites which could be linked through SSH keys - another 2.5% of sites.
Through Apache mod_status leaks we were able to identify another 10 clusters of sites sharing hosting infrastructure, another 1% of sites.
Therefore only 21 infrastructure setups account for 27% (~1500) of all active Onion Services!
If we assume the relationships we identified in the previous section also leak co-hosting information we can push this estimate to ~30 setups accounting for 30-35% of all Onion Services!
It is important to iterate that these numbers don't mean that 35% of Onion Services are operated by one of 30 groups - but that they are likely hosted by one of those groups - and remember, these are only the relationships we have been able to discern from rather trivial correlations - there are likely many more.
This lack of diversity in hosting infrastructure is concerning - it places the future of a large proportion of Onion Services in the hands of a limited number of groups.
Other OnionScan News
We have a new home - mascherari.press. All future OnionScan reports will be published here, as well as lots of other articles and discussions about anonymity and privacy.
OnionScan now supports XMPP thanks to Scott Ainslie!
OnionScan was included in ArchStrike Linux! We are super excited that this tool reaching more people in the security community.
Get Involved
If you would like to help please get in touch at team@onionscan.org.
Goals for the OnionScan Project
Increase the number of scanned onion services - We have so far only successfully scanned ~5000 (out of ~11,000 domains scanned).
Increase the number of protocols scanned. OnionScan currently supports light analysis for HTTP and SSH, and detection analysis for FTP, SMTP, Bitcoin, IRC, XMPP and Ricochet - we want to grow this list, as well as provide deeper analysis on all protocols.
Develop a standard for classifying onion services that can be used for crime analysis as well as an expanded analysis of usage from political activism to instant messaging.
TAGS
onions onionscan reports tor hidden services
SHARE
ABOUT THE AUTHOR
Sarah is an Independent Anonymity & Privacy Researcher. She maintains the @OnionScan project. PGP:0xFEA818621D9905DC ricochet:qn6uo4cmsrfv4kzq
@SarahJamieLewis Vancouver Website More posts
ONIONSCAN
OnionScan Report: May 2016 - Technologies used by Onion Services
SARAH JAMIE LEWIS 03 Jun 2016
ONIONS
Thwarting Identity Correlation Attacks
SARAH JAMIE LEWIS 05 Jul 2016
Mascherari Press is an organization that publishes insights on anonymity & privacy to understand how they impact those that rely on them, and to learn how to build better tools to empower people.
PROJECTS
OnionScan is a free and open source tool for investigating the Dark Web.
Queer Privacy is a collection of essays about community, family, coming out, dating, domestic violence, activism, sex work and suicide and how these parts of life influence, impact and change the way we think about privacy.
SUPPORT US!
Our projects would not be possible without you. Please consider supporting us.
HIRE US!
Have an interesting research problem? Want an in-depth security analysis in a challenging area? Get in touch with our research team.
WRITE FOR US!
If you have something you would like us to cover or would like to pitch us on a story please email editors@mascherari.press.
© Copyright 2017 Mascherari Press. All rights reserved.
"
https://mascherari.press/onionscan-report-june-2016/#:~:text=OnionScan%20Report%20June,All%20rights%20reserved.
Thus we can place some bounds on the number of unique hosting providers being used:
Of the ~5600 active sites that we scanned during June - 23% shared a single unique SSH Key - linking them to Freedom Hosting II.
1% can be attributed to the hosting provider we talked about above via FTP.
We were able to identify another 9 clusters of sites which could be linked through SSH keys - another 2.5% of sites.
Through Apache mod_status leaks we were able to identify another 10 clusters of sites sharing hosting infrastructure, another 1% of sites.
Therefore only 21 infrastructure setups account for 27% (~1500) of all active Onion Services!
If we assume the relationships we identified in the previous section also leak co-hosting information we can push this estimate to ~30 setups accounting for 30-35% of all Onion Services!
It is important to iterate that these numbers don't mean that 35% of Onion Services are operated by one of 30 groups - but that they are likely hosted by one of those groups - and remember, these are only the relationships we have been able to discern from rather trivial correlations - there are likely many more.
This lack of diversity in hosting infrastructure is concerning - it places the future of a large proportion of Onion Services in the hands of a limited number of groups.
Other OnionScan News
We have a new home - mascherari.press. All future OnionScan reports will be published here, as well as lots of other articles and discussions about anonymity and privacy.
OnionScan now supports XMPP thanks to Scott Ainslie!
OnionScan was included in ArchStrike Linux! We are super excited that this tool reaching more people in the security community.
Get Involved
If you would like to help please get in touch at team@onionscan.org.
Goals for the OnionScan Project
Increase the number of scanned onion services - We have so far only successfully scanned ~5000 (out of ~11,000 domains scanned).
Increase the number of protocols scanned. OnionScan currently supports light analysis for HTTP and SSH, and detection analysis for FTP, SMTP, Bitcoin, IRC, XMPP and Ricochet - we want to grow this list, as well as provide deeper analysis on all protocols.
Develop a standard for classifying onion services that can be used for crime analysis as well as an expanded analysis of usage from political activism to instant messaging.
TAGS
onions onionscan reports tor hidden services
SHARE
ABOUT THE AUTHOR
Sarah is an Independent Anonymity & Privacy Researcher. She maintains the @OnionScan project. PGP:0xFEA818621D9905DC ricochet:qn6uo4cmsrfv4kzq
@SarahJamieLewis Vancouver Website More posts
ONIONSCAN
OnionScan Report: May 2016 - Technologies used by Onion Services
SARAH JAMIE LEWIS 03 Jun 2016
ONIONS
Thwarting Identity Correlation Attacks
SARAH JAMIE LEWIS 05 Jul 2016
Mascherari Press is an organization that publishes insights on anonymity & privacy to understand how they impact those that rely on them, and to learn how to build better tools to empower people.
PROJECTS
OnionScan is a free and open source tool for investigating the Dark Web.
Queer Privacy is a collection of essays about community, family, coming out, dating, domestic violence, activism, sex work and suicide and how these parts of life influence, impact and change the way we think about privacy.
SUPPORT US!
Our projects would not be possible without you. Please consider supporting us.
HIRE US!
Have an interesting research problem? Want an in-depth security analysis in a challenging area? Get in touch with our research team.
WRITE FOR US!
If you have something you would like us to cover or would like to pitch us on a story please email editors@mascherari.press.
© Copyright 2017 Mascherari Press. All rights reserved.
"
https://mascherari.press/onionscan-report-june-2016/#:~:text=OnionScan%20Report%20June,All%20rights%20reserved.
Mascherari Press
OnionScan Report June 2016 - Snapshots of the Dark Web
Welcome to the third OnionScan Report. The aim of these reports is to provide an accurate and up-to-date analysis of how anonymity networks are being used in the real world. In this report we will deliver some insights into how onion services are related…
👍1

OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime
Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime
Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
Forwarded from Dr. BOTMAN (@BotMan Baphomet)

OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime
Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
OnionScan is a free and open source tool for investigating the Dark Web. Read more about how it works and how to use it on GitHub.
Discovering the Dark Web
For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no effective technological patch - human error.
Whether it is operational security leaks or software misconfiguration - most often attacks on anonymity don't come from breaking the underlying systems, but from ourselves.
OnionScan has two primary goals:
We want to help operators of hidden services find and fix operational security issues with their services. We want to help them detect misconfigurations and we want to inspire a new generation of anonymity engineering projects to help make the world a more private place.
Secondly we want to help researchers and investigators monitor and track Dark Web sites. In fact we want to make this as easy as possible. Not because we agree with the goals and motives of every investigation force out there - most often we don't. But by making these kinds of investigations easy, we hope to create a powerful incentive for new anonymity technology (see goal #1)
OnionScan Reports
OnionScan Report: Freedom Hosting II, A New Map and a New Direction OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation SystemsOnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations OnionScan Report: July 2016 - HTTPS Somewhere Sometimes OnionScan Report June 2016 - Snapshots of the Dark Web OnionScan Report: May 2016 - Technologies used by Onion Services OnionScan Report: April 2016 - The Tor Network: Security and Crime
Supporters & Contributors
The hosting of this site and all OnionScan Infrastructure is generously supported by our patrons. If you would like to support OnionScan research and development you can do so at Patreon - Backers get access to exclusive reports and pre-releases of research. We would like to say a big thank you to:
Zaki Manian
Dan Ballard
CJ
Lennie Budgell
Joshua Opolko
Dave Warren
MOVRCX X64 EDITION
Mikey
gnujedi
Jack Grigg
All backers who have chosen to support anonymously
Much of OnionScan would not exist today without the work of contributors, writing code to make OnionScan more useful, more efficient and more usable. A list of contributors can be found on Github
Get OnionScan 0.2
You can find download and installation instructions for OnionScan on our Github
OnionScan is also available on some Linux distributions
Follow Us On Twitter
All of our new reports and releases can be found @OnionScan
In the News

A Tool to Check If Your Dark Web Site Really Is Anonymous

Dark Web Drug Dealers are Making Sloppy Mistakes -

The Dark Web - Just How Dark is It?
Reporting Bugs
Found a bug in OnionScan? Check the issues page to see if it's already been reported, or open a new issue here.
Like all software, OnionScan may contain bugs or vulnerabilities. Because it is still in early stages of development, caution is recommended before using OnionScan in high-risk environments. Ultimately, everyone uses OnionScan at their own risk.
OnionScan is developed by Sarah Jamie Lewis and is released under an MIT License.
Media is too big
VIEW IN TELEGRAM
fc5fd9111098493495a155b405021ebf55482809-144p.mp4
Forwarded from Collectoruz
🚀 Rocket-чек на 37.74 USDT (37.7$)
Внутри чека: 1258 активация(й) по 0.02 USDT (0.02$) с реферальной наградой 0.01 USDT (0.01$)
Внутри чека: 1258 активация(й) по 0.02 USDT (0.02$) с реферальной наградой 0.01 USDT (0.01$)
💋1
Forwarded from Azazel News (Aries)
This media is not supported in your browser
VIEW IN TELEGRAM
❌ Paralysis At London Station As Pro-Palestine Protesters Stage Sit-In
London Liverpool Street Station Is currently in chaos as protesters demand a ceasefire on Gaza.
London Liverpool Street Station Is currently in chaos as protesters demand a ceasefire on Gaza.
Forwarded from Miles Black
Media is too big
VIEW IN TELEGRAM
Forwarded from 👁️️️️🪐️QNews Baphomet Lives Matter 2024 Media zolgharnain Aryan Patriots 999 eagleeye QAnon bigfoot 🪐🔑🧑🍳#Anonmasonre #1Q9 (@MetaLivesMatter @Botman)
Forwarded from @BotMan Baphomet
Telegram
QAnon 9