summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--NEWS.md7
-rw-r--r--README.md1
-rw-r--r--image/feed.pngbin0 -> 654 bytes
-rw-r--r--ismitmlink/bg.js2
-rw-r--r--ismitmlink/cs.js5
-rw-r--r--ismitmlink/manifest.json2
6 files changed, 13 insertions, 4 deletions
diff --git a/NEWS.md b/NEWS.md
index f7b6d653..0ab6a6fd 100644
--- a/NEWS.md
+++ b/NEWS.md
@@ -1,3 +1,10 @@
+*2019.02.25*
+
+```
+I've reported 100s of criminal websites and they are still operating behind Cloudflare infrastructure.
+```
+https://twitter.com/phyzonloop/status/1100066830553702400
+
*2019.02.24*
diff --git a/README.md b/README.md
index 17918fd5..d220991e 100644
--- a/README.md
+++ b/README.md
@@ -38,6 +38,7 @@ Also see [Frequently Asked Questions](faq.md).
* Add WTF-Cloudflare news to [NEWS.md](NEWS.md)
* Search something on [Searxes](https://searxes.danwin1210.me/) (this will help collecting Searxes' "MITM domains")
* Take a look at [add-on code](ismitmlink/)
+* Subscribe to an ![](image/feed.png) RSS feed: ["The Great Cloudwall News"](https://searxes.danwin1210.me/collab/open/getrss.php?q=tmg1news)
![WTF](image/wtfcf.jpg)
diff --git a/image/feed.png b/image/feed.png
new file mode 100644
index 00000000..3a859cee
--- /dev/null
+++ b/image/feed.png
Binary files differ
diff --git a/ismitmlink/bg.js b/ismitmlink/bg.js
index a3e3bfbe..5e575692 100644
--- a/ismitmlink/bg.js
+++ b/ismitmlink/bg.js
@@ -26,7 +26,7 @@ browser.runtime.onMessage.addListener((request, sender, sendResponse) => {
if (request && sender) {
if (mymemory[request] != undefined) {
let rlt = mymemory[request];
- if (Object.keys(mymemory).length > 800) {
+ if (Object.keys(mymemory).length > 20000) {
let cnt = 1;
for (let t in mymemory) {
if (cnt > 10) {
diff --git a/ismitmlink/cs.js b/ismitmlink/cs.js
index d19ab5b1..b28b81ef 100644
--- a/ismitmlink/cs.js
+++ b/ismitmlink/cs.js
@@ -1,5 +1,5 @@
if (document.body) {
- if (!['searxes.danwin1210.me', 'searxes.nmqnkngye4ct7bgss4bmv5ca3wpa55yugvxen5kz2bbq67lwy6ps54yd.onion'].includes(location.hostname)) {
+ if (!['searxes.danwin1210.me', 'searxes.nmqnkngye4ct7bgss4bmv5ca3wpa55yugvxen5kz2bbq67lwy6ps54yd.onion', 'searxes.cyb'].includes(location.hostname)) {
let cs = (function () {
let s = document.createElement('style');
document.head.appendChild(s);
@@ -7,8 +7,9 @@ if (document.body) {
})();
if (cs) {
cs.insertRule("a[data-mitm]{text-decoration-line:line-through !important;text-decoration-color:red !important;text-decoration-style:double !important}", 0);
+ cs.insertRule("a[data-mitm]::after{content:'[MITM!]';font-weight:bold}", 1);
}
- let asked = [location.hostname, 'searxes.danwin1210.me'];
+ let asked = [location.hostname, 'searxes.danwin1210.me', 'searxes.nmqnkngye4ct7bgss4bmv5ca3wpa55yugvxen5kz2bbq67lwy6ps54yd.onion', 'searxes.cyb'];
document.querySelectorAll("a[href^='http://']:not([data-mitm]),a[href^='https://']:not([data-mitm]),a[href^='//']:not([data-mitm])").forEach(a => {
let aF = (new URL(a.href)).hostname;
if (!/^(.*)\.(onion|i2p|invalid|test|local|localhost|([0-9]{1,3}))$/.test(aF) && !asked.includes(aF)) {
diff --git a/ismitmlink/manifest.json b/ismitmlink/manifest.json
index b7142bab..885e2004 100644
--- a/ismitmlink/manifest.json
+++ b/ismitmlink/manifest.json
@@ -2,7 +2,7 @@
"manifest_version": 2,
"name": "Are links vulnerable to MITM attack?",
"description": "Scan FQDN using Searxes' API",
- "version": "1.0.1",
+ "version": "1.0.2",
"author": "Maslin Bossé",
"permissions": [],
"icons": {