Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <a...@mit.edu>: > > On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote: > > With the large sudden spike in hidden services addresses, any way to > > view what the newly registered .onion addresses are or at least a > > list of hidden services during the suspected time frame? > > No, there is no easy way to do this. That's because there is no central > repository of onion addresses. There are services like Ahmia that try to > enumerate what they can, by looking at various sources like the content > on a set of known onion sites. But that only lets you learn about sites > that wanted to let you find out about them. > > This is actually a really complicated topic, because there are a wide > variety of ways of learning about onion addresses, each of which has > its own ethical questions around how invasive you have to be. For > example, you can get them by Googling for .onion addresses (probably > fine), or by being Verizon or Comcast and spying on the people who > use your DNS servers (not so fine), or by running Tor relays and spying > on the hidden service descriptors that people upload (not fine). > Another service is http://tor.luakt.net , which managed to find my otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does listen on port 80 though.
René -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk