http://xhqthou6scpfnwjyzc3ekdgcbvj76ccgyjyxp6cgypxjlcuhnxiktnqd.onion
Also,
while there are some really neat Tor attacks that people have published
about, it's hard to track down a copy of the code they used. Let us know if
you have new tools we should list, or improvements to the existing ones. The
more the better, at this stage. We need defenses too — not just attacks . Most researchers find it easy
and fun to come up with novel attacks on anonymity systems.