2017-03-10 21:13 GMT+01:00 ng0 <contact....@cryptolab.net>: > Massimo La Morgia transcribed 6.7K bytes: > > On Fri, Mar 10, 2017 at 5:39 PM, David Fifield <da...@bamsoftware.com> > > wrote: > > > > > On Fri, Mar 10, 2017 at 12:58:55PM +0100, Massimo La Morgia wrote: > > > > we are a research group at Sapienza University, Rome, Italy. We do > > > research on > > > > distributed systems, Tor, and the Dark Web. As part of our work, we > have > > > > developed OnionGatherer, a service that gives up-to-date information > > > about Dark > > > > Web hidden services to Tor users. > > > > > > ...and presumably helps you build a crowdsourced list of onion services > > > that you plan to use for some other research purpose? > > > > > > > yes, of course in this way we are building a crowdsourced list of onion > > services, but is not really different from onion directories. > > At this time we have no plan for other research that use this > crowdsourced > > list. > > > > > > > > > > If you're planning a research project on Tor users, you should write to > > > the research safety board and get ideas about how ot do it in a way > that > > > minimizes risk. > > > https://research.torproject.org/safetyboard.html > > > > > > > > thank you for the suggestion. > > > > > > > This idea seems, to me, to have a lot of privacy problems. You're > asking > > > people to use Chrome instead of Tor Browser, which means they will be > > > vulnerable to a lot of fingerprinting and trivial deanonymization > > > attacks. > > > > > > No we are not asking people to use chrome for browsing on tor, but we are > > offering a service that can help them to know if a onion address is up > > before start to surf with Tor Browser > > Having only an extension for Chrome based browsers implies asking users > to use Chrome based browsers. If there were a choice between Firefox and > Chrome extensions, it would be less clear and not implying. >
Yes, you're right, but we have created this extension in order to offer a service to people. We chose to start with Chrome because it has a greater number of users. We would be happy if it will be used and also developed for Firefox. > > > Your extension reports not only the onion domains that it > > > finds, but also the URL of the page you were browsing at the time: > > > var onionsJson = JSON.stringify({onions:onions, website: > > > window.location.href}); > > > You need to at least inform your research subjects/users what of their > > > private data you are storing and what you are doing with it. > > > > > > > As you can see from the source code we are not storing any sensitive data > > like ip or users information. do you think that only URL page can damage > > user privacy? > > This aside, do you just check if the page still exists or the top level > onion domain you found this page on? If so, this would be an improvement > I'd suggest, to only use the toplevel domain. > I have not looked at your code. > Thank you for the suggestion, we'll improve the website's URL management asap. > > > > > > > > > > You're using two different regexes for onion URLs that aren't the same. > > > The one used during replacement doesn't match "https", so I guess it > > > will fail on URLs like https://facebookcorewwwi.onion/. > > > /^(http(s)?:\/\/)?.{16}(\.onion)\/?.*$/ > > > /(http:\/\/)?\b[\w\d]{16}\.onion(\/[\S]*|)/ > > > > > > > Yes, you right, thank you for the feedback. > > > _______________________________________________ > > tor-dev mailing list > > tor-dev@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > >
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev