-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi,
> Is there anyway to somehow automate the process? (The developer in > me coming out) > Absolutely. > I ask because this seems like something that you will be doing > perpetually. Something like an algorithm that can compare > percentage match of heuristics of a database of previous sites > marked as fake against all new ones and then giving a trust score? > > First way I did this was pretty simple: I compared my real ahmia (msydqstlz2kzerdg.onion) to the fake one. I scanned them and detected the difference. The fake ahmia changes URLs to point to fake services. Now I have several clever methods to detect fake websites. > I'd be happy to help write something in Python to do this & put on > github, assuming I can get a decent sets of sample data to test > against. > Thanks! Be free to do that. I can help :) Share your code and ideas. > Or would putting it out there publically allow those creating the > fake sites to up their game and change their tactics. Seems like > this will always be a cat & mouse game. > Yes, that's why I am not describing all of my methods publicly. Please note that the attacker is probably reading this mailing list. - -Juha -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJWtL73AAoJELGTs54GL8vAx7UIALErU1Id4xmoZXXJ5oT241/1 xrW7cd7cmbBuk9lLJmNpAXacyCQsFLNb4Nct4maUFvrb/cNbU96vOfVD7IIKgIEY 6LgMnkvxhC2ymrcgboh1bMIauRojkLuDDxOka8qPDDjjyd0S1RP1v3F/GIq9yEpM JNUzil9O1zokKiLx7h/CmZ4nIB/1xEzq9Q6VdeQuS+StnSK6QsfYlkzv9w31uZEX Kd1wJnCnnp3nm6i+yqQiW8wVwg6fC28JfuTi2YDXrhAkDgXRgxZNKHKDe2a3TnIe QSkZeO/ZbHvKFdiriRGCoBLLiIxYSI64nWb2a1YxMRTVAo17dmkVS3QquCqES8w= =QxNL -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk