Thursday, February 27, 2025
HomeInfosec- ResourcesShare Your Files Anonymously Using TOR and Onion Share

Share Your Files Anonymously Using TOR and Onion Share

Published on

SIEM as a Service

Follow Us on Google News

There is a bunch of reasons why people may look to share records anonymously, with the principal that rings a bell being the situation of informants or political activists attempting to keep up a strategic distance from abuse.(TOR)

As we know there are various ways which you can share documents on the web. Google Drive, Dropbox, and other cloud storage choices are among the primary inclinations.Yet, these record sharing choices miss the mark with respect to anonymity.

Also Read:  Secrets of Dark Web – How to Access Dark Web Safely

OnionShare

OnionShare lets you safely and anonymously share records of any size. It works by beginning a web server, making it open as a Tor onion service, and producing an unguessable URL to get to and download the records.

It doesn’t need setting up a server on the web some place or utilizing an outsider filesharing service. You have the record all alone PC and use a Tor onion service to make it incidentally available over the web.

The other client simply needs to use Tor Browser to download the record from you.

OnionShare is a free P2P file sharing service created by technologist Micah Lee that operates without intermediator.

How to use Onion Share

  • You can download OnionShare from its official site. It is accessible for Windows, MacOS, and Linux working frameworks.
  • Before you can share documents, you have to open Tor Browser in Background. This will give the Tor service that OnionShare uses to begin the onion service.
  • Open OnionShare and drag and drop files and folders you wish to share, and hit Start Sharing. It will demonstrate to you a .onion URL, such as (http://asxmi4q6i7pajg2b.onion/egg-cain), and copy it to your clipboard.
 TOR
  • This is the secret URL that can be used to download the document you’re sharing. In the event that you’d like many people to be able to download this record, uncheck the “close automatically” checkbox.
  • Send this URL to the person you’re attempting to send the files to. In the event that the records you’re sending aren’t secret, you can use the ordinary method for sending the URL: messaging it, presenting it on Facebook or Twitter, and so forth. In case you’re attempting to send secret records then it’s essential to send this URL safely.
 TOR
  • The person who is getting the documents not required to bother with OnionShare. All they need is to open the URL you send them in Tor Browser to be able to download the document.

Also read: TOR and VPN Anonymous enough for Dark Web

How it works

  • To begin with, the sender picks files and folders they wish to share to the beneficiary. OnionShare then begins a web server at 127.0.0.1 on a random port.
  • It picks two words from a 6800-long word list called a slug and makes the files accessible for download at http://127.0.0.1:[port]/[slug]/
  • It then makes the web server open as Tor onion service and shows the URL HTTP://[onionservice].onion/[slug] to the sender to share. A last OnionShare URL looks something like http://f5ratndpx7rgvh7i.onion/test-share.
  • The sender is in charge of safely sharing that URL to their preferred beneficiary utilizing a correspondence channel.
  • The beneficiary must use Tor Browser to stack the URL and download the records.
  • When the mutually shared files downloaded, or when the sender closes OnionShare, the Tor onion administration and web servers close down, totally removing the records from the web.

Features of Onion Share

  • A user-friendly drag-and-drop graphical user interface that works on Windows, Mac OS X, and Linux.
  • Ability to share multiple files and folders at once.
  • Support for multiple people downloading files at once.
  • Automatically copies the unguessable URL to your clipboard.
  • Shows you the progress of file transfers.
  • When the file is done transferring, automatically closes OnionShare to reduce the attack surface.
  • Localized into several languages, and supports international Unicode filenames.

Secure

  • Third parties don’t have access to files being shared.
  • Network eavesdroppers can’t spy on files in transit.
  • The anonymity of sender and recipient are protected by Tor.
  • If an attacker enumerates the onion service, the shared files stay safe.

Doesn’t Secure

  • Communicating the OnionShare URL might not be secure.
  • Communicating the OnionShare URL might not be anonymous.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...