(no title)
kosasbest | 2 years ago
https://www.bbcnewsd73hkzno2ini43t4gblxvycyac5aw4gnv7t2rccijh7745uqd.onion
Just be careful out there. All I have to do is alter one letter for the BBC .onion and I can get phished/scammed/duped. For example, this is an altered .onion for BBC: https://www.bbcnewsd73hkzno2ini43t4gblxvycyac5aw4gnv7t2rccijh7746uqd.onion
Can you spot the alteration?> Accurate URLs verified by PGP. No direct linking in order to protect against DNS leaks from accidental clicking in a clearnet browser.
How does the PGP verif work? I'm not used to it. There exists a tool here[1] but how does it all work?
LeoPanthera|2 years ago
It is computationally infeasible to generate an onion address similar to an existing one. Yes you could make another one that starts with "bbcnews", but all/most of the other characters would be different. Additionally, since the BBC is using https, the cert would be different, or missing.
This is scaremongering.
3np|2 years ago
~10 characters are easy enough to generate on a single machine so don't rely on a vanity-prefix and the trailing couple of characters only, but getting a new .onion address matching even half of an existing one within the lifetime of civilization is unrealistic even with state-actor resources.
You'd be better off trying to brute-force Satoshi's bitcoin private keys if you're feeling that lucky...
https://github.com/cathugger/mkp224o/issues/27
schoen|2 years ago
The expected number of attempts to get one success at this would then be about 2²⁶⁹. Even so, a typosquatting victim would be very unlikely to make the exact right typo for the attack to work!
I think my reasoning is wrong somehow because I think there are only 2²⁵⁶ different onionsite public keys, so it doesn't quite make sense that you would have to do 2¹³ more work than trying all of them. But I'm still pretty convinced that it's going to be infeasible without a strong break of the hash function.
In terms of attacks that merely try to generate onion addresses that are merely somewhat visually similar to target ones (e.g. by matching at the very beginning and very end?), these are possible, and it would be interesting to see research about how likely people are to fall for various attacks like that. Maybe that research has already been done?
Jerrrry|2 years ago
.onion domain address are like cryptographic collisions - you must try trillons of nonces (random numbers, ya nasty brits) to even approach the chance of a collision that is recognizable in a literary sense.
Now, RAT's waiting patiently for you to copy/paste transferred funds have plenty of time - especially when they know (and so do many wallets noawadays) that most people check the first and last characters.
Retr0id|2 years ago
I have no doubt that you can find one with similar prefix and/or suffix, but not to the degree of similarity of your example.
michaelt|2 years ago
It doesn't.
But you could use brute force to produce something like https://www.bbcnewsd7xlp77nkq76byazcldy2hlmovfu2egnv7t2rccij... and at least some people will be inattentive enough to fall for it.
unknown|2 years ago
[deleted]
Tenoke|2 years ago
dark.fail has been comrpomised in the past
https://www.reddit.com/r/onions/comments/n1byhj/has_darkfail...
https://www.reddit.com/r/onions/comments/12axsiz/is_darkfail...
SuperGlueDoctor|2 years ago
I will try to give a simplified explanation as best I can. PGP verification is a vital process to learn. Once learned it is easy to verify yourself. You need to know PGP if you are visiting .onion sites, it is not optional if you want any certainty.
The information in a PGP signed message is encrypted using a password (the private key) in such a way that only a different password (the public key) could unlock it. Once you have a trustworthy public key from a site/individual, you can check to see if a message was signed using the correct password in the matching private key.
If truly kept private, you can trust it is a message from the same person who gave you the the public key to begin with. That is how we know .onion urls are from the owners of the sites.
If the address ever needs to change, they will sign a new message that you can know for certain came from someone in possession of the SAME private key as the first time. Same if there is a new key pair, they sign it with the old one too, so you can trust the new one equally as the old. Well, you can trust it as much as you trust the owner to not have shared it or been hacked, bribed, or arrested.
Dark.fail tries to be someone you can trust. If you did trust them, you could trust all the addresses on their site, and thereby the public keys listed on those sites to be trustworthy as well. Dark.fail gives their seal of approval that everything belongs to whom it should on their site.
Their tool is just checking to make sure the keys match up correctly.
You cannot trust Dark.fail's seal of approval. They have proven you cannot trust them. Do not visit their site anymore. You always need to verify for yourself. Learn how.
aborsy|2 years ago
Also, depends how the owner of the site protects their public key, and monitors the website.
I wonder if a significant of the links (if not most) are scam or honeypots.
cqqxo4zV46cp|2 years ago
yieldcrv|2 years ago
dark.fail has been full of fail for about 3 years straight now. you would think tor is basically dead if you use dark.fail
ClassyJacket|2 years ago
verisimi|2 years ago
yes!
5uqd.onion
vs
6uqd.onion