Doxbin
   HOME

TheInfoList



OR:

Doxbin is a defunct onion service. It was a type of
pastebin A pastebin or text storage site is a type of online content-hosting service where users can store plain text (e.g. source code snippets for code review via Internet Relay Chat (IRC)). The first pastebin was the eponymous pastebin.com. Other ...
primarily used by people posting personal data (often referred to as ''doxing'') of any person of interest. Due to the illegal nature of much of the information it published (such as
social security numbers In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued t ...
, bank routing information, and credit card information, all in
plain-text In computing, plain text is a loose term for data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects ( floating-point numbers, images, etc.). It may also include a lim ...
), it was one of many sites seized during '' Operation Onymous'', a multinational police initiative, in November 2014.


History

Doxbin was established to act as a secure, anonymous venue for the publication of dox, first established by an individual known as nachash. Dox being a term in
Internet culture Internet culture is a culture based on the many way people have used computer networks and their use for communication, entertainment, business, and recreation. Some features of Internet culture include online communities, gaming, and social medi ...
which refers to personally identifiable information about individuals, including social security numbers, street addresses,
username A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), accoun ...
s,
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
s, and
password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
s, obtained through a variety of legal and illegal means. In November 2012, Doxbin's
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
handle @Doxbin was attributed to an attack on Symantec, coordinated with Anonymous' ''Operation Vendetta''. It first attracted attention in March 2014 when its then-owner hijacked a popular
Tor hidden service Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
,
The Hidden Wiki The Hidden Wiki was a dark web MediaWiki wiki operating as Tor hidden services that could be anonymously edited after registering on the site. The main page served as a directory of links to other .onion sites. History The first Hidden Wik ...
, pointing its visitors to Doxbin instead as a response to the maintenance of pages dedicated to
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
links. In June 2014, their
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
account was suspended, prompting the site to start listing the personal information of the Twitter founders and CEO. In October 2014, Doxbin hosted personal information about Katherine Forrest, a federal judge responsible for court rulings against the owner of
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
-based black market Silk Road, leading to
death threat A death threat is a threat, often made anonymously, by one person or a group of people to kill another person or group of people. These threats are often designed to intimidate victims in order to manipulate their behaviour, in which case a de ...
s and harassment. Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative ''Operation Onymous''. Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized
distributed denial of service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conne ...
(DDoS) or exploited mistakes in its
PHP PHP is a general-purpose scripting language geared toward web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by The PHP Group. ...
code. However, the site could still be restored easily by setting up a new domain.


See also

*
Cyberstalking legislation Cyberstalking and cyberbullying are relatively new phenomena, but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose. Although there are often existing laws that prohibit stal ...
*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
* Privacy law


References

{{Tor hidden services Defunct Tor hidden services Internet privacy Internet properties disestablished in 2014 Internet services shut down by a legal challenge Harassment