The server is temporarily down due to security improvements, thank you very much for your suggestions.
2017-03-10 21:02 GMT+01:00 simone raponi < raponi.1539...@studenti.uniroma1.it>: > > > 2017-03-10 21:13 GMT+01:00 ng0 <contact....@cryptolab.net>: > >> Massimo La Morgia transcribed 6.7K bytes: >> > On Fri, Mar 10, 2017 at 5:39 PM, David Fifield <da...@bamsoftware.com> >> > wrote: >> > >> > > On Fri, Mar 10, 2017 at 12:58:55PM +0100, Massimo La Morgia wrote: >> > > > we are a research group at Sapienza University, Rome, Italy. We do >> > > research on >> > > > distributed systems, Tor, and the Dark Web. As part of our work, we >> have >> > > > developed OnionGatherer, a service that gives up-to-date information >> > > about Dark >> > > > Web hidden services to Tor users. >> > > >> > > ...and presumably helps you build a crowdsourced list of onion >> services >> > > that you plan to use for some other research purpose? >> > > >> > >> > yes, of course in this way we are building a crowdsourced list of onion >> > services, but is not really different from onion directories. >> > At this time we have no plan for other research that use this >> crowdsourced >> > list. >> > >> > >> > > >> > > If you're planning a research project on Tor users, you should write >> to >> > > the research safety board and get ideas about how ot do it in a way >> that >> > > minimizes risk. >> > > https://research.torproject.org/safetyboard.html >> > > >> > > >> > thank you for the suggestion. >> > >> > >> > > This idea seems, to me, to have a lot of privacy problems. You're >> asking >> > > people to use Chrome instead of Tor Browser, which means they will be >> > > vulnerable to a lot of fingerprinting and trivial deanonymization >> > > attacks. >> > >> > >> > No we are not asking people to use chrome for browsing on tor, but we >> are >> > offering a service that can help them to know if a onion address is up >> > before start to surf with Tor Browser >> >> Having only an extension for Chrome based browsers implies asking users >> to use Chrome based browsers. If there were a choice between Firefox and >> Chrome extensions, it would be less clear and not implying. >> > > Yes, you're right, but we have created this extension in order to offer a > service to people. > We chose to start with Chrome because it has a greater number of users. > We would be happy if it will be used and also developed for Firefox. > > >> > > Your extension reports not only the onion domains that it >> > > finds, but also the URL of the page you were browsing at the time: >> > > var onionsJson = JSON.stringify({onions:onions, website: >> > > window.location.href}); >> > > You need to at least inform your research subjects/users what of their >> > > private data you are storing and what you are doing with it. >> > > >> > >> > As you can see from the source code we are not storing any sensitive >> data >> > like ip or users information. do you think that only URL page can damage >> > user privacy? >> >> This aside, do you just check if the page still exists or the top level >> onion domain you found this page on? If so, this would be an improvement >> I'd suggest, to only use the toplevel domain. >> I have not looked at your code. >> > > Thank you for the suggestion, we'll improve the website's URL management > asap. > >> >> > >> > >> > >> > > You're using two different regexes for onion URLs that aren't the >> same. >> > > The one used during replacement doesn't match "https", so I guess it >> > > will fail on URLs like https://facebookcorewwwi.onion/. >> > > /^(http(s)?:\/\/)?.{16}(\.onion)\/?.*$/ >> > > /(http:\/\/)?\b[\w\d]{16}\.onion(\/[\S]*|)/ >> > > >> > >> > Yes, you right, thank you for the feedback. >> >> > _______________________________________________ >> > tor-dev mailing list >> > tor-dev@lists.torproject.org >> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >> >> >
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev