Delivery-Date: Fri, 19 Feb 2016 02:44:54 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1BB381E0A9A;
	Fri, 19 Feb 2016 02:44:53 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A0A5F3971A;
	Fri, 19 Feb 2016 07:44:48 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 78A613970F
 for <tor-talk@lists.torproject.org>; Fri, 19 Feb 2016 07:44:45 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Xo2cGS3-onUv for <tor-talk@lists.torproject.org>;
 Fri, 19 Feb 2016 07:44:45 +0000 (UTC)
Received: from forward4.bravehost.com (forward4.bravehost.com [65.39.211.71])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
 bits)) (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 572B1396B6
 for <tor-talk@lists.torproject.org>; Fri, 19 Feb 2016 07:44:45 +0000 (UTC)
X-Virus-Scanned: amavisd-new at bravehost.com
Received: from webmail.bravehost.com (unknown [172.16.0.199])
 (Authenticated sender: cannon@cannon-ciota.info)
 by forward4.bravehost.com (Postfix) with ESMTPA id 29577596C
 for <tor-talk@lists.torproject.org>; Thu, 18 Feb 2016 23:44:40 -0800 (PST)
MIME-Version: 1.0
Date: Fri, 19 Feb 2016 01:44:40 -0600
From: CANNON NATHANIEL CIOTA <cannon@cannon-ciota.info>
To: tor-talk@lists.torproject.org
In-Reply-To: <56C6C6EA.7060203@gmail.com>
References: <A154C659-98B9-4B5A-AE8B-89A67EA8BF78@riseup.net>
 <20160218102232.GF522@riseup.net>
 <1455791363286-17a6f558-170f335c-e09f3707@cryptolab.net>
 <B1DF85FA-1505-4531-AE74-9F573E654CBA@riseup.net>
 <20160218155107.GA10235@moria.seul.org>
 <CAL3oi7bZxA1T0Kyqgg3eJ_RjxgLt9dV8Ciu90OXMXKX3L=cfLA@mail.gmail.com>
 <CAD--ZDWjv73D9WDPXizYeb6G5wgaVhoU3_oLtF5+LpW_rsLjnQ@mail.gmail.com>
 <CAC+VsLt_jL3eZ+DqU4r7X2R7UiSTcHC7xFKvWfZUY5RWwEbspA@mail.gmail.com>
 <1455821568637-16a57a55-60666851-0834de3b@cryptolab.net>
 <229f25b3dc53e572e3e7e75926a855e8@cannon-ciota.info>
 <56C6C6EA.7060203@gmail.com>
Message-ID: <96390cbd31f12c0488be5ee3f6914d76@cannon-ciota.info>
X-Sender: cannon@cannon-ciota.info
User-Agent: Bravenet Webmail/1.1.4
Subject: Re: [tor-talk] large increase in .onion domains
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 2016-02-19 01:40, Jeremy Rand wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> On 02/19/2016 01:37 AM, CANNON NATHANIEL CIOTA wrote:
>> 
>>> On Thu, Feb 18, 2016 at 12:15 PM, Nathaniel Suchy
>>> <admin@nsuchy.top> wrote:
>>> 
>>>> Could new people be using Onionchat/Torchat I can't remember
>>>> the name. But new addresses are generated for each client. On
>>>> Thu, Feb 18, 2016 at 11:49 AM Alexandre Guillioud <
>>>> guillioud.alexandre@gmail.com> wrote:
>>>> 
>>>>> Not correlated (i'm too small in that pool), but i have workd
>>>>> on
>>>> software
>>>>> to maintain a HS pool. During dev, and at one point, i was
>>>>> emitting thousands of registration a day.
>>>>> 
>>>>> 2016-02-18 16:51 GMT+01:00 Roger Dingledine <arma@mit.edu>:
>>>>> 
>>>>>> On Thu, Feb 18, 2016 at 05:45:26AM -0500, Scfith Rise up
>>>>>> wrote:
>>>>>>> Here is the exact link:
>>>>>> https://metrics.torproject.org/hidserv-dir-onions-seen.html
>>>> 
>>>>>> 
>>>> 
>>>>>>> it jumped from 40000 to 60000 in the past day or two.
>> 
>> That chat program you are referring to would be ricochet IM
>> 
> 
> Well, there was something called TorChat which fits that description,
> but TorChat hasn't gotten any security updates or maintenance in
> years, so Ricochet is pretty clearly preferable.
> 
> Cheers,
> - -Jeremy Rand
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
> 
> iQIcBAEBCAAGBQJWxsbIAAoJEAHN/EbZ1y06R58P/iSTYdrFlWjnF0j7oX7pa3hx
> pIbDapAtja9KyfoDnPY0tM/AJmCMGqyDci9OMrdYyfx4ek8OAS0bjhWQNz0h/Cpu
> TpjSrylanIzMBkf0z3HQ4cSpEMFylMKhZMC3cId64ucE3zT2R9nQ0HssPBtxoX0f
> SmrH+pS8F2GVlQRywkIW3lWc7dbFmzVM7ceaWA7ADPBxfnJg8nqpmLOQkTo3Khts
> AGyLplwNa83FYcXZ39aubTMjyomCti5zkqbzTFFCgydfQSVzPCoSUnQ2fsQjmsfB
> uVo1iWUh4tZrGypnl1Jv4JbAdAy2wwt/mDFpo1dqdUHRUMT9evA9MH9F/Qdj2EF2
> IrgjhdMuFV8gTQL976TJ9Zbdz9V+qX59MN5uIRNdx38NBlQR/plvXXGl4IHvVFZX
> utE/kuvPKV5hpPIUN1UudiApKAf5l/9kvXOkQL/AQak9Lkn/79f2Kj04aQhD/1Hj
> OTxT1IdZBWDQnMwTZKql4tW0r+NJwNKj4JapYWYSKUWY0uGYnQE9dnQeWDzmmGi8
> sc4coeO4ZqDrfUAmlDt/kjdyE3/OQalFXmB3OZsPfmlOn8gxUhs+y0INnUXJtROq
> 1gJdxLWJTNEZAvhfG1sU2HGF6Rd8cY8E1AUvG42oMbjiJsFISfvUMIDcDOFVv3S7
> XSH2oB3zZv4+T97/Z488
> =7/Ep
> -----END PGP SIGNATURE-----

I also know latest version of Bitcoin Core has capability of 
automatically creating .onion host, maybe the testing of that could have 
been result in spike as well? Though I am leaning more towards botnet or 
malware being the likely reason behind jump in hidden services.

-- 
Cannon N. Ciota
Digital Identity (namecoin): id/cannon
Website: www.cannon-ciota.info
Email: cannon@cannon-ciota.info
PGP Fingerprint: E7FB 0605 1BD4 8B88 B7BC 91A4 7DF7 76C7 25A6 AEE2
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

