Sunday, April 13, 2025
HomeInfosec- ResourcesShare Your Files Anonymously Using TOR and Onion Share

Share Your Files Anonymously Using TOR and Onion Share

Published on

SIEM as a Service

Follow Us on Google News

There is a bunch of reasons why people may look to share records anonymously, with the principal that rings a bell being the situation of informants or political activists attempting to keep up a strategic distance from abuse.(TOR)

As we know there are various ways which you can share documents on the web. Google Drive, Dropbox, and other cloud storage choices are among the primary inclinations.Yet, these record sharing choices miss the mark with respect to anonymity.

Also Read:  Secrets of Dark Web – How to Access Dark Web Safely

- Advertisement - Google News

OnionShare

OnionShare lets you safely and anonymously share records of any size. It works by beginning a web server, making it open as a Tor onion service, and producing an unguessable URL to get to and download the records.

It doesn’t need setting up a server on the web some place or utilizing an outsider filesharing service. You have the record all alone PC and use a Tor onion service to make it incidentally available over the web.

The other client simply needs to use Tor Browser to download the record from you.

OnionShare is a free P2P file sharing service created by technologist Micah Lee that operates without intermediator.

How to use Onion Share

  • You can download OnionShare from its official site. It is accessible for Windows, MacOS, and Linux working frameworks.
  • Before you can share documents, you have to open Tor Browser in Background. This will give the Tor service that OnionShare uses to begin the onion service.
  • Open OnionShare and drag and drop files and folders you wish to share, and hit Start Sharing. It will demonstrate to you a .onion URL, such as (http://asxmi4q6i7pajg2b.onion/egg-cain), and copy it to your clipboard.
 TOR
  • This is the secret URL that can be used to download the document you’re sharing. In the event that you’d like many people to be able to download this record, uncheck the “close automatically” checkbox.
  • Send this URL to the person you’re attempting to send the files to. In the event that the records you’re sending aren’t secret, you can use the ordinary method for sending the URL: messaging it, presenting it on Facebook or Twitter, and so forth. In case you’re attempting to send secret records then it’s essential to send this URL safely.
 TOR
  • The person who is getting the documents not required to bother with OnionShare. All they need is to open the URL you send them in Tor Browser to be able to download the document.

Also read: TOR and VPN Anonymous enough for Dark Web

How it works

  • To begin with, the sender picks files and folders they wish to share to the beneficiary. OnionShare then begins a web server at 127.0.0.1 on a random port.
  • It picks two words from a 6800-long word list called a slug and makes the files accessible for download at http://127.0.0.1:[port]/[slug]/
  • It then makes the web server open as Tor onion service and shows the URL HTTP://[onionservice].onion/[slug] to the sender to share. A last OnionShare URL looks something like http://f5ratndpx7rgvh7i.onion/test-share.
  • The sender is in charge of safely sharing that URL to their preferred beneficiary utilizing a correspondence channel.
  • The beneficiary must use Tor Browser to stack the URL and download the records.
  • When the mutually shared files downloaded, or when the sender closes OnionShare, the Tor onion administration and web servers close down, totally removing the records from the web.

Features of Onion Share

  • A user-friendly drag-and-drop graphical user interface that works on Windows, Mac OS X, and Linux.
  • Ability to share multiple files and folders at once.
  • Support for multiple people downloading files at once.
  • Automatically copies the unguessable URL to your clipboard.
  • Shows you the progress of file transfers.
  • When the file is done transferring, automatically closes OnionShare to reduce the attack surface.
  • Localized into several languages, and supports international Unicode filenames.

Secure

  • Third parties don’t have access to files being shared.
  • Network eavesdroppers can’t spy on files in transit.
  • The anonymity of sender and recipient are protected by Tor.
  • If an attacker enumerates the onion service, the shared files stay safe.

Doesn’t Secure

  • Communicating the OnionShare URL might not be secure.
  • Communicating the OnionShare URL might not be anonymous.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...