Delivery-Date: Fri, 15 Aug 2014 01:25:59 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 2EDEA1E068E;
	Fri, 15 Aug 2014 01:25:57 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 42A1230B32;
	Fri, 15 Aug 2014 05:25:53 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 0398930AF2
 for <tor-talk@lists.torproject.org>; Fri, 15 Aug 2014 05:25:50 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id DYDFGV_JIagN for <tor-talk@lists.torproject.org>;
 Fri, 15 Aug 2014 05:25:49 +0000 (UTC)
Received: from SNT004-OMC3S14.hotmail.com (snt004-omc3s14.hotmail.com
 [65.55.90.153])
 (using TLSv1.2 with cipher AES128-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id BAEB1309A2
 for <tor-talk@lists.torproject.org>; Fri, 15 Aug 2014 05:25:49 +0000 (UTC)
Received: from SNT146-W79 ([65.55.90.137]) by SNT004-OMC3S14.hotmail.com with
 Microsoft SMTPSVC(7.5.7601.22701); Thu, 14 Aug 2014 22:25:47 -0700
X-TMN: [nfff3YPH0l66cOP+FFf09r/gxQN2iwz1]
X-Originating-Email: [chewy0914@hotmail.com]
Message-ID: <SNT146-W79BF0B7519C943EFB7FF54A3E90@phx.gbl>
From: Ben Healey <chewy0914@hotmail.com>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Date: Thu, 14 Aug 2014 23:25:46 -0600
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 15 Aug 2014 05:25:47.0016 (UTC)
 FILETIME=[5E3C3080:01CFB849]
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Pattern In Tor Addresses
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Message: 4
Date: Thu, 14 Aug 2014 21:07:30 -0600
From: Ben Healey <chewy0914@hotmail.com>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Subject: [tor-talk] Pattern In Tor Addresses
Message-ID: <SNT146-W88CAE79E4B6229301EAAF3A3E90@phx.gbl>
Content-Type: text/plain; charset="iso-8859-1"
 
Hello,
 
I started by trying to figure out tor(find websites and so on.)
Noticed there are 16 keys per address.
Almost all I've seen have at least 1 number.
 
I then started generating keys. They were hit and miss to even try to connect.
 
I've now looked at the combinations of numbers and letters and have found a pattern.
 
Below is they address changed into numbers.
Letters changed into numbers starting with a-1 through z-26.
The numbers are the numbers 1.2.3......
 
I then added all them together.
 
Then divided the totals by 2.
 
Results:
-----
8 2 4 2 13 23 19 20 18 6 11 12 2 19 9 6        174 /2 87  /2 43.5
 
2 7 9 3 2 7 7 8 21 8 18 5 7 2 4 4              114 /2 57  /2 28.5
 
26 17 11 20 8 3 21 9 13 22 24 7 12 6 18 9      226 /2 113 /2 56.5
 
16 7 10 1 6 3 6 26 15 5 1 18 10 15 6 9         154 /2 77  /2 38.5
 
5 8 1 2 11 8 14 20 17 10 4 20 3 11 10 17       161 /2 80.5
 
11 4 10 13 4 5 3 3 16 14 19 6 5 4 3 3          123 /2 61.5
 
2 7 9 3 2 7 7 8 21 8 18 5 7 2 4 4              114 /2 57  /2  28.5
 
2 12 3 10 7 3 20 1 12 21 8 23 9 4 24 5         164 /2 82  /2  41 /2 20.5
 
They all seem to at some point end in a half number???
 
.
.
If anyone knows a key generator that i can program with parameters as defined below for more trying please let me know.
 
 
-----
16 key gen, letters and numbers,(possible define numbers below1/5-1/3 the total output)
Set key to be a multiple 1+--* of a half number. and maybe others parameters.
----
 
BH



.......................
.......................
.......................

The reason I had thought the numbers may matter is that if I modify or
create an address that has the same total value as an existing one I saw Tor almost every time
Tor tries to connect.

When the key generator I've been trying produced an address 90% of the time the browser does nothing.
 
I have the generator set to 16key length numbers and letters.
One thing I noticed is it outputs addresses more often with more numbers
than the active sites I've seen.

 		 	   		  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

