Skip to main content

Digging Deep: Suspicious Activities Spotted in Tor’s Hidden Addresses



Tor is one of the specialised browsers available out there. It is used by people to browse both the internet and to communicate with others in private. The thing about using the internet while keeping your online identity anonymous is that it gives you extra protection from harms that could be caused by cybercrime activities. That is why, Tor is used a lot to browse unindexed sides of the internet called the deep web, or dubbed by some others as the dark web, depending on how you see it. It earns its name for no joking reasons either, dark web is notorious for its illegal or criminal activities. Tons of malicious viruses may lurk behind the contents floating around the deeper side of the internet, and there has been a lot of scary stories associated with this obscure corner. Recently, the suspense thickens was a security expert found out mysteries behind Tor’s hidden addresses. This ‘mystery’ is an unprecedented increase in the number of hidden web addresses found in Tor’s network. What is going on?




Delving Deeper into the Mystery

According to Prof Alan Woodward from the University of Surrey, there has been more than 25,000 .onion deep web services popped out in the recent months, and counting. He wasn’t too sure on how to explain this sudden explosion, but he posed some of the possible hypotheses anyway. A possibility he suggested is that “the boom” is probably triggered by Ricochet, a popular app that uses Tor’s service in order to make instant messaging between its users anonymous. The Onion Router, or Tor for short, has the ability to let people browsing the inter-web anonymously by routing their addresses and connections through a chain of multiple computers as well as using complicated data encryption in the process. As explained earlier, this network helps users to maintain their privacy securely. But, in every sorts of privacies, there are concerns of illegal activities being done behind the scene and all sorts of cybercrimes taking place.


“Unprecedented” Online Activity

Professor Woodward noted on his blog that this sort of thing never happened before, at least when one looked at the Tor network’s history. He suspected that there are some unprecedented things happening behind the scene, but in the meantime, it is the only thing that we know. It is difficult to pin-point things that are happening behind Tor’s scene, especially since it is created to protect people’s privacy instead of disclosing them. The thing that sparked curiosity behind this happening is that despite there’s clearly a rise of hidden network addresses, the traffic on it hasn’t been eventful at all. Deciphering the traffic content floating about the Tor network is probably something that most people will consider, but unfortunately, it is generally impossible to do so. And there’s also this concern of privacy that would be unethical to breach. There is also a possibility that this is caused by a botnet or a malware that duplicates unique network addresses when it infects someone’s computers, even though evidence for this has not yet to be found. Maybe there’s someone out there who has been experimenting on Tor, or maybe, it’s just because of the popularity of Ricochet, as suggested by Prof Woodward.


What Exactly Is Ricochet?

As explained earlier, Ricochet is an instant messaging app that uses the network of Tor in order to create a private connections between two users who wish to keep their online identity anonymous. It is very secure and this thing is achieved by not revealing either the IP addresses or the location of a user. Also, instead of a username, each of individuals who use ricochet will be given a set of unique IP addresses to mask their real ones. It has been around for quite a while, but only came into public’s positive recognition quite recently. When setting up their service, Ricochet will make unique hidden addresses, and this makes quite a logical and likely explanation for the sudden spike of Tor’s hidden addresses. But still, the mysteries behind Tor’s hidden addresses remain in the deep without concrete evidence to support it.

Popular posts from this blog

Google Maps makes Traveling Easier

With the growth of technology, there has been an implausible development in the Google maps. It has become the hope for the people who love to travel many places. It makes people get through the details of many known and unknown places before visiting there. So on the whole Google Maps is one of the great applications created by Google.

While people are willing to visit new places at that time people can make their proper planning. In that context, Google made available the whole process by which the directions for travel can get quicker to the users.

For that reason, this availability of navigation introduced by Google created an ease by which the users can visit their favourite places. With the selection of favourite places, users can also have the facility to go there as per their feasibility. This clear organisation for future reference is also available in the Google Maps which adds to make the app user-friendly for the users.



For example, if any person wants a break from his…

A Research Team Warns the Spread of Linux/Shishiga Malware

A team of research found a new malware called Linux/Shishiga, which targets Lua programming language and script on Linux-based devices
A new strain of Linux Malware has been around for some times. The malware, which Eset Research and Michal Malik called “Linux/Shishiga”, could prose serious danger to the system. The new threat was reported to represent Lua Family, but it is not related to the existing LuaBot malware. Linux/Shishiga targets Lua script.

Lua contains a series of modules, which give the designers flexibility. Lua is known for as a lightweight and efficient scripting language. Lua language is widely used for procedural programming, functional programming, object-oriented programming, data description, and data-driven programming. Lua is now used for Flame and Evilbunny, and it is a popular choice among APT makers.

The programming language has been around since 1993. It was designed to meet the increasing demand for customizable programming language at that time. It includ…

11 Free Online Tools for Graphic Designing

Graphic Design is also known as communication design. Good communication skills is an essential part of the designer’s toolkit. It includes a creative plan to solve a problem or achieve certain objectives with the use of images, symbols or words. Graphic designing is a type of visual communication and graphical expression of concepts.

Graphic designer use designs, illustrations, logos and symbols to make visual more impressive. They design your website visual in a way so that it reflects your motto. They used different types of fonts, spacing, color, images in their work to make visual reflective to your aim. Graphic designing can be described as digital art, where graphic designers use their talent and innovation together with digital tools and we get output in the form of strong visual.

Today, we will discuss the best free online tools that can help in designing great visuals. Each graphic designer has their own favorite tools because of their usefulness and reliability. So, have a…

Apple is No Longer the Most Valuable Brand in the World As Google Grabbed the Top Position

Topsy turvy goes the road for Apple as it steps down from its lead position in the global market. Google leaps up to be the leading brand in the world. Apple lacks innovation in its pipeline. Slipping down to the 2nd global position in the list of most valuable global brands it has brought the brand value of Apple Inc. way down.

Google, the leader in the market GOOGL,-0.60%, has shown considerable growth of 24%. The growth in its brand value ranged from $88.2 billion in 2016 to $109.5 billion in 2017. It was last in 2011 when Google was in the 1st position, stated by a strategy and valuation consultancy, ‘Brand Finance’. Its own search operating business is the focal point of advertising income. It has got no competition when it comes to search over the internet.

2017 VS Apple! 2017 has not begun with a bright sun for Apple. With a brand worth $107.1 billion in 2017, Apple AAPL, +6.10% manage to be in the 2nd spot. Although the market is growing, the company's share is getting re…

Top 5 Best Smart Watches

Did you ever think that your wrist watch can do many other things either than showing time or date? Yes, you can do many other things with the help of your watch if it is smart. Wearing normal traditional watches has gone old fashioned now because the entrance of smart watches has changed the whole scenario. It is the latest technology which came into existence by integration of both wristwatch and smartphone.

It is an innovative technology that lets you operate the standard functions of the smartphone with the help of a simple wearable watch. The functionalities and capabilities of the smart watch are almost same to the smart phone. The sensors smart watch such as accelerometer, gyroscope and compass etc integrates with your smart phone and enable you to perform various operations such as:-

• Running or closing mobile apps
• Connecting to the internet
• Sending text or video messages
• Picking up or disconnecting call
• Providing weather updates
• Fitness monitorin…