Jump to content

Doxbin (darknet): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Tag: Reverted
mNo edit summary
 
(21 intermediate revisions by 9 users not shown)
Line 1: Line 1:
{{Short description|Defunct document sharing website}}
{{Short description|Defunct document sharing website}}
{{pp|small=yes}}

{{Distinguish|text = with the unrelated [[Doxbin (clearnet)|clearnet website]]}}
{{Distinguish|text = with the unrelated [[Doxbin (clearnet)|clearnet website]]}}

{{Infobox website
{{Infobox website
| name = Doxbin
| name = Doxbin
Line 21: Line 20:
| author =
| author =
| key_people =
| key_people =
| founder =
| founder =
| editor =
| editor =
| launch_date = {{Start date and age|2011|5|30}}
| launch_date = {{Start date and age|2011|5|30}}
| current_status =
| current_status = Offline
| alexa =
| alexa =
}}
}}
'''Doxbin''' is a defunct [[onion service]]. It was a [[pastebin]] primarily used by people posting [[personal data]] (often referred to as ''[[doxing]]'') of any person of interest.
'''Doxbin''' was an [[onion service]]. It was a [[pastebin]] primarily used by people posting [[personal data]] (often referred to as ''[[doxing]]'') of any person of interest.


Due to the illegal nature of much of the information it published (such as [[Social Security number|social security numbers]], bank routing information, and credit card information, all in [[Plain text|plain-text]]), it was one of many sites seized during ''[[Operation Onymous]]'', a multinational police initiative, in November 2014.<ref name=":0">{{Cite news |last=Fox-Brewster |first=Tom |date=2014-12-09 |title=The darkweb's nihilistic vigilante sees the light |language=en-GB |work=The Guardian |url=https://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |access-date=2020-11-06 |issn=0261-3077 |archive-date=2021-03-23 |archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |url-status=live }}</ref>
Due to the illegal nature of much of the information it published (such as [[Social Security number|social security numbers]], bank routing information, and credit card information, all in [[Plain text|plain-text]]), it was one of many sites seized during ''[[Operation Onymous]]'', a multinational police initiative, in November 2014.<ref name=":0">{{Cite news |last=Fox-Brewster |first=Tom |date=2014-12-09 |title=The darkweb's nihilistic vigilante sees the light |language=en-GB |work=The Guardian |url=https://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |access-date=2020-11-06 |issn=0261-3077 |archive-date=2021-03-23 |archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |url-status=live }}</ref>


== History ==
== Pwned and Hacked by '''#DemonSquad''' ==






This page dedicated to the organization of "[[Doxbin.com|Doxbin]]" has been hacked and exterminated by '''#DemonSquad''' due to bad purpose with illegal acts, all the leaders and founders of "Doxbin" are now targets of our organization.

We see everything, remember that.


Doxbin was established by an individual known online as "nachash"<ref name=":0" /> to act as a secure, [[anonymity|anonymous]] venue for the publication of a dox. Dox being a term in [[Internet culture]] which refers to personally identifiable information about individuals, including [[social security number]]s, [[street address]]es, [[username]]s, [[email]]s, and [[password]]s, obtained through a variety of legal and illegal means.<ref name="dailydot">{{Cite news |last=Howell O'Neill |first=Patrick |date=10 November 2014 |title=Dark Net hackers steal seized site back from the FBI |work=Daily Dot |url=http://www.dailydot.com/politics/doxbin-dark-net/ |access-date=25 January 2015 |archive-date=17 November 2014 |archive-url=https://web.archive.org/web/20141117042505/http://www.dailydot.com/politics/doxbin-dark-net/ |url-status=live }}</ref><ref name=":0" />


In November 2012, Doxbin's [[Twitter]] handle @Doxbin was attributed to an attack on [[NortonLifeLock|Symantec]], coordinated with [[Anonymous (hacker group)|Anonymous]]' ''Operation Vendetta''.<ref name=":0" />


It first attracted attention in March 2014 when its then-owner hijacked a popular [[Tor hidden service]], [[The Hidden Wiki]], pointing its visitors to Doxbin instead as a response to the maintenance of pages dedicated to [[child pornography]] links.<ref name="dothiddenwiki">{{Cite web |last=Howell O'Neill |first=Patrick |title=Deep Web hub hacked and shut down over child porn links |url=http://www.dailydot.com/news/hidden-wiki-deep-web-hacked-intangir/ |website=Daily Dot |date=12 March 2014 |access-date=2015-01-25 |archive-date=2015-04-02 |archive-url=https://web.archive.org/web/20150402152351/http://www.dailydot.com/news/hidden-wiki-deep-web-hacked-intangir/ |url-status=live }}</ref><ref name="vice">{{Cite web |last=Mead |first=Derek |date=13 March 2014 |title=A Hacker Scrubbed Child-Porn Links from the Dark Web's Most Popular Site |url=https://www.vice.com/read/a-hacker-scrubbed-child-porn-links-from-the-dark-webs-most-popular-site-mb-test |website=Vice |access-date=26 August 2017 |archive-date=11 October 2016 |archive-url=https://web.archive.org/web/20161011030140/http://www.vice.com/read/a-hacker-scrubbed-child-porn-links-from-the-dark-webs-most-popular-site-mb-test |url-status=live }}</ref><ref name="doxbintwitter">{{Cite web |date=12 June 2014 |title=Twitter Founders' Personal Information Released on Doxbin |url=http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/ |url-status=dead |archive-url=https://archive.today/20150127044858/http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/ |archive-date=27 January 2015 |access-date=27 January 2015 |website=Darkweb News}}</ref> In June 2014, their [[Twitter]] account was suspended, prompting the site to start listing the personal information of the Twitter founders and CEO.<ref>{{Cite news |last=Tarquin |date=June 12, 2014 |title=Twitter Founders' Personal Information Released on DOXBIN |url=http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/ |url-status=dead |access-date=20 August 2015 |archive-url=https://archive.today/20150127044858/http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/ |archive-date=27 January 2015}}</ref> In October 2014, Doxbin hosted personal information about [[Katherine B. Forrest|Katherine Forrest]], a [[federal judge]] responsible for court rulings against the owner of [[Tor (anonymity network)|Tor]]-based [[black market]] [[Silk Road (marketplace)|Silk Road]], leading to [[death threat]]s and [[harassment]].<ref name=dailydot/><ref name="deepdotforrest">{{Cite web |date=13 October 2014 |title=Site Doxx'es Judge of Silk Road Case – Calls To "Swat" Her |url=http://www.deepdotweb.com/2014/10/13/site-doxxes-judge-of-silk-road-case-calls-to-swat-her/ |url-status=dead |archive-url=https://web.archive.org/web/20150324120116/http://www.deepdotweb.com/2014/10/13/site-doxxes-judge-of-silk-road-case-calls-to-swat-her/ |archive-date=24 March 2015 |access-date=25 January 2015 |website=[[DeepDotWeb]]}}</ref>


Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative ''Operation Onymous''.<ref name="deepdot1">{{Cite news |last=Rauhauser |first=Neal |date=11 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.1) |work=[[DeepDotWeb]] |url=http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128114214/http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |archive-date=28 January 2015}}</ref><ref name="ars">{{Cite web |last=Gallagher |first=Sean |date=9 November 2014 |title=Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS |url=https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |website=Ars Technica |access-date=14 June 2017 |archive-date=22 April 2017 |archive-url=https://web.archive.org/web/20170422031926/https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |url-status=live }}</ref><ref name="dotonymous">{{Cite web |last=O'Neill |first=Patrick Howell |date=17 November 2014 |title=Tor eyes crowdfunding campaign to upgrade its hidden services |url=http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |access-date=25 January 2015 |website=Daily Dot |archive-date=12 February 2015 |archive-url=https://web.archive.org/web/20150212134909/http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |url-status=live }}</ref> Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized [[distributed denial-of-service attack]] (DDoS) or exploited mistakes in its [[PHP]] code.<ref name=deepdot1/><ref name=ars/><ref name="deepdot2">{{Cite news |last=Muadh |first=Zubair |date=12 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.2) |work=Deepdotweb |url=http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128115155/http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |archive-date=28 January 2015}}</ref><ref name="supervillain">{{Cite web |last=nachash [handle] |title=[tor-dev] yes hello, internet supervillain here |url=https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |website=[tor-dev] mailing list archive |date=8 November 2014 |access-date=2015-01-25 |archive-date=2015-02-04 |archive-url=https://web.archive.org/web/20150204042240/https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |url-status=live }}</ref> However, the site could still be restored easily by setting up a new domain.<ref>{{Cite web|date=2014-12-09|title=The darkweb's nihilistic vigilante sees the light|url=http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|access-date=2021-04-28|website=the Guardian|language=en|archive-date=2021-03-23|archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|url-status=live}}</ref>
Sincerely: '''#DemonSquad'''


== See also ==
== See also ==
Line 63: Line 55:
[[Category:Internet services shut down by a legal challenge]]
[[Category:Internet services shut down by a legal challenge]]
[[Category:Domain name seizures by United States]]
[[Category:Domain name seizures by United States]]
[[Category:Cyberstalking]]

Latest revision as of 23:48, 6 June 2024

Doxbin
Type of site
Pastebin
Available inEnglish
RegistrationOptional
Users50,000
LaunchedMay 30, 2011; 13 years ago (2011-05-30)
Current statusOffline
Written inPHP

Doxbin was an onion service. It was a pastebin primarily used by people posting personal data (often referred to as doxing) of any person of interest.

Due to the illegal nature of much of the information it published (such as social security numbers, bank routing information, and credit card information, all in plain-text), it was one of many sites seized during Operation Onymous, a multinational police initiative, in November 2014.[1]

History

Doxbin was established by an individual known online as "nachash"[1] to act as a secure, anonymous venue for the publication of a dox. Dox being a term in Internet culture which refers to personally identifiable information about individuals, including social security numbers, street addresses, usernames, emails, and passwords, obtained through a variety of legal and illegal means.[2][1]

In November 2012, Doxbin's Twitter handle @Doxbin was attributed to an attack on Symantec, coordinated with Anonymous' Operation Vendetta.[1]

It first attracted attention in March 2014 when its then-owner hijacked a popular Tor hidden service, The Hidden Wiki, pointing its visitors to Doxbin instead as a response to the maintenance of pages dedicated to child pornography links.[3][4][5] In June 2014, their Twitter account was suspended, prompting the site to start listing the personal information of the Twitter founders and CEO.[6] In October 2014, Doxbin hosted personal information about Katherine Forrest, a federal judge responsible for court rulings against the owner of Tor-based black market Silk Road, leading to death threats and harassment.[2][7]

Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative Operation Onymous.[8][9][10] Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized distributed denial-of-service attack (DDoS) or exploited mistakes in its PHP code.[8][9][11][12] However, the site could still be restored easily by setting up a new domain.[13]

See also

References

  1. ^ a b c d Fox-Brewster, Tom (2014-12-09). "The darkweb's nihilistic vigilante sees the light". The Guardian. ISSN 0261-3077. Archived from the original on 2021-03-23. Retrieved 2020-11-06.
  2. ^ a b Howell O'Neill, Patrick (10 November 2014). "Dark Net hackers steal seized site back from the FBI". Daily Dot. Archived from the original on 17 November 2014. Retrieved 25 January 2015.
  3. ^ Howell O'Neill, Patrick (12 March 2014). "Deep Web hub hacked and shut down over child porn links". Daily Dot. Archived from the original on 2015-04-02. Retrieved 2015-01-25.
  4. ^ Mead, Derek (13 March 2014). "A Hacker Scrubbed Child-Porn Links from the Dark Web's Most Popular Site". Vice. Archived from the original on 11 October 2016. Retrieved 26 August 2017.
  5. ^ "Twitter Founders' Personal Information Released on Doxbin". Darkweb News. 12 June 2014. Archived from the original on 27 January 2015. Retrieved 27 January 2015.
  6. ^ Tarquin (June 12, 2014). "Twitter Founders' Personal Information Released on DOXBIN". Archived from the original on 27 January 2015. Retrieved 20 August 2015.
  7. ^ "Site Doxx'es Judge of Silk Road Case – Calls To "Swat" Her". DeepDotWeb. 13 October 2014. Archived from the original on 24 March 2015. Retrieved 25 January 2015.
  8. ^ a b Rauhauser, Neal (11 November 2014). "Doxbin's Nachash On Operation Onymous (P.1)". DeepDotWeb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  9. ^ a b Gallagher, Sean (9 November 2014). "Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS". Ars Technica. Archived from the original on 22 April 2017. Retrieved 14 June 2017.
  10. ^ O'Neill, Patrick Howell (17 November 2014). "Tor eyes crowdfunding campaign to upgrade its hidden services". Daily Dot. Archived from the original on 12 February 2015. Retrieved 25 January 2015.
  11. ^ Muadh, Zubair (12 November 2014). "Doxbin's Nachash On Operation Onymous (P.2)". Deepdotweb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  12. ^ nachash [handle] (8 November 2014). "[tor-dev] yes hello, internet supervillain here". [tor-dev] mailing list archive. Archived from the original on 2015-02-04. Retrieved 2015-01-25.
  13. ^ "The darkweb's nihilistic vigilante sees the light". the Guardian. 2014-12-09. Archived from the original on 2021-03-23. Retrieved 2021-04-28.