Delivery-Date: Mon, 29 Feb 2016 18:14:39 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id ED7B91E02B5;
	Mon, 29 Feb 2016 18:14:37 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 494BA3A0A1;
	Mon, 29 Feb 2016 23:14:33 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id A159A3A098
 for <tor-talk@lists.torproject.org>; Mon, 29 Feb 2016 23:14:29 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id FV9oQcHiYwB0 for <tor-talk@lists.torproject.org>;
 Mon, 29 Feb 2016 23:14:29 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 83CDC3A01C
 for <tor-talk@lists.torproject.org>; Mon, 29 Feb 2016 23:14:29 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id 173B51E0B2E; Mon, 29 Feb 2016 18:14:27 -0500 (EST)
Date: Mon, 29 Feb 2016 18:14:27 -0500
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20160229231426.GG10235@moria.seul.org>
References: <A154C659-98B9-4B5A-AE8B-89A67EA8BF78@riseup.net>
 <56C63981.2080604@gmail.com> <56C63AD3.4000002@justaguy.pw>
 <CAD2Ti2-Znf2kCogg_grDqCeWR4FwHERAE1giZgLggoM-6CUFkA@mail.gmail.com>
 <5134ABF1-A5A6-45AB-8103-2E85001564D4@riseup.net>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5134ABF1-A5A6-45AB-8103-2E85001564D4@riseup.net>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] large increase in .onion domains
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Sun, Feb 28, 2016 at 12:01:54PM -0500, Scfith Rise up wrote:
> Now the spike is up to over 80000 domains. The Tor Project has had more
>than a few days now to analyze this,

This is true, but we don't know anything more than we did, and until
something changes we will continue to not know. My answer from earlier
still stands:
"We need to see more improvements in the field of privacy-preserving
statistics and measurements before we'll feel comfortable trying to get
answers to this question."

Also, let me clarify that it is not 80000 domains, but rather it is 80000
onion addresses worth of descriptors. There is nothing that says any of
these onion addresses ever had anything listening on them.  One person
can generate and publish thousands of onion descriptors, and the graph
would go up up up.

For many more details, here is the methodology for counting:
https://blog.torproject.org/blog/some-statistics-about-onions
and
https://research.torproject.org/techreports/extrapolating-hidserv-stats-2015-01-31.pdf

> any update or feedback regarding
>what these appear to be beyond "we need to wait and see." Personally,
>I think it is, in fact, Ricochet.

We've talked to special, the Ricochet developer, who said he didn't see
anything close to a jump in Ricochet downloads that would account for
this graph going up. My current guess is that it's just somebody
uploading a bunch of descriptors. But who knows.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

