Monday, January 27, 2025
HomeInfosec- ResourcesShare Your Files Anonymously Using TOR and Onion Share

Share Your Files Anonymously Using TOR and Onion Share

Published on

SIEM as a Service

Follow Us on Google News

There is a bunch of reasons why people may look to share records anonymously, with the principal that rings a bell being the situation of informants or political activists attempting to keep up a strategic distance from abuse.(TOR)

As we know there are various ways which you can share documents on the web. Google Drive, Dropbox, and other cloud storage choices are among the primary inclinations.Yet, these record sharing choices miss the mark with respect to anonymity.

Also Read:  Secrets of Dark Web – How to Access Dark Web Safely

OnionShare

OnionShare lets you safely and anonymously share records of any size. It works by beginning a web server, making it open as a Tor onion service, and producing an unguessable URL to get to and download the records.

It doesn’t need setting up a server on the web some place or utilizing an outsider filesharing service. You have the record all alone PC and use a Tor onion service to make it incidentally available over the web.

The other client simply needs to use Tor Browser to download the record from you.

OnionShare is a free P2P file sharing service created by technologist Micah Lee that operates without intermediator.

How to use Onion Share

  • You can download OnionShare from its official site. It is accessible for Windows, MacOS, and Linux working frameworks.
  • Before you can share documents, you have to open Tor Browser in Background. This will give the Tor service that OnionShare uses to begin the onion service.
  • Open OnionShare and drag and drop files and folders you wish to share, and hit Start Sharing. It will demonstrate to you a .onion URL, such as (http://asxmi4q6i7pajg2b.onion/egg-cain), and copy it to your clipboard.
 TOR
  • This is the secret URL that can be used to download the document you’re sharing. In the event that you’d like many people to be able to download this record, uncheck the “close automatically” checkbox.
  • Send this URL to the person you’re attempting to send the files to. In the event that the records you’re sending aren’t secret, you can use the ordinary method for sending the URL: messaging it, presenting it on Facebook or Twitter, and so forth. In case you’re attempting to send secret records then it’s essential to send this URL safely.
 TOR
  • The person who is getting the documents not required to bother with OnionShare. All they need is to open the URL you send them in Tor Browser to be able to download the document.

Also read: TOR and VPN Anonymous enough for Dark Web

How it works

  • To begin with, the sender picks files and folders they wish to share to the beneficiary. OnionShare then begins a web server at 127.0.0.1 on a random port.
  • It picks two words from a 6800-long word list called a slug and makes the files accessible for download at http://127.0.0.1:[port]/[slug]/
  • It then makes the web server open as Tor onion service and shows the URL HTTP://[onionservice].onion/[slug] to the sender to share. A last OnionShare URL looks something like http://f5ratndpx7rgvh7i.onion/test-share.
  • The sender is in charge of safely sharing that URL to their preferred beneficiary utilizing a correspondence channel.
  • The beneficiary must use Tor Browser to stack the URL and download the records.
  • When the mutually shared files downloaded, or when the sender closes OnionShare, the Tor onion administration and web servers close down, totally removing the records from the web.

Features of Onion Share

  • A user-friendly drag-and-drop graphical user interface that works on Windows, Mac OS X, and Linux.
  • Ability to share multiple files and folders at once.
  • Support for multiple people downloading files at once.
  • Automatically copies the unguessable URL to your clipboard.
  • Shows you the progress of file transfers.
  • When the file is done transferring, automatically closes OnionShare to reduce the attack surface.
  • Localized into several languages, and supports international Unicode filenames.

Secure

  • Third parties don’t have access to files being shared.
  • Network eavesdroppers can’t spy on files in transit.
  • The anonymity of sender and recipient are protected by Tor.
  • If an attacker enumerates the onion service, the shared files stay safe.

Doesn’t Secure

  • Communicating the OnionShare URL might not be secure.
  • Communicating the OnionShare URL might not be anonymous.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...