Delivery-Date: Fri, 10 Jun 2016 15:56:35 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [138.201.14.202])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 9744C1E08B8;
	Fri, 10 Jun 2016 15:56:33 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 437ACE14A7;
	Fri, 10 Jun 2016 19:56:28 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C2F11E127B
 for <tor-talk@lists.torproject.org>; Fri, 10 Jun 2016 19:56:24 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id GDXIJS26GGM8 for <tor-talk@lists.torproject.org>;
 Fri, 10 Jun 2016 19:56:24 +0000 (UTC)
Received: from smarthost1.greenhost.nl (smarthost1.greenhost.nl
 [195.190.28.81]) (using TLSv1 with cipher AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id A2593E10E0
 for <tor-talk@lists.torproject.org>; Fri, 10 Jun 2016 19:56:24 +0000 (UTC)
Received: from smtp.greenhost.nl ([213.108.104.138])
 by smarthost1.greenhost.nl with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)
 (Exim 4.72) (envelope-from <lucas@codingrights.org>)
 id 1bBSXT-0005Aj-V1
 for tor-talk@lists.torproject.org; Fri, 10 Jun 2016 21:56:21 +0200
To: tor-talk@lists.torproject.org
From: Lucas Teixeira <lucas@codingrights.org>
Message-ID: <575B1B5C.4030705@codingrights.org>
Date: Fri, 10 Jun 2016 16:56:12 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101
 Icedove/38.7.0
MIME-Version: 1.0
X-Authenticated-As-Hash: 0f7b5b48b1898a35d139638a49277ef123befdec
X-Virus-Scanned: by clamav at smarthost1.samage.net
X-Scan-Signature: 025acf9a139f050bc01ccdeba87e03e0
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Firefox add-on tells when website on clearnet has .onion
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

The table pointing associating clearnet domains with .onion addresses is
maintained on a .csv on a git repo. Is this the first time someone does
this kind of thing? Could this grow into a community maintained database?

https://github.com/Someguy123/HiddenEverywhere

--------


  <https://github.com/Someguy123/HiddenEverywhere#hiddeneverywhere>HiddenEverywhere

A Firefox add-on to help TOR users find hidden services for ClearNet
sites they use every day.

Often, I tell people of Facebook's hidden service
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>
only to hear they didn't know. It's been around since 2014, offering TOR
users additional security, compared to the Clearnet.

The most recent encounter with someone who actively used TOR for their
daily activities had me think, "what if Firefox could tell you when a
site you're using has a hidden service, even if you're stuck behind a
Cloudflare Captcha?".

And thus, this extension was born. When you visit a site such as
LiteVault.net <https://www.litevault.net> or Facebook.com, the extension
will inform you that you should be using the hidden service, with a
direct link to it.

[...]


  <https://github.com/Someguy123/HiddenEverywhere#new-domains>New Domains

To add a new domain, simply fork the repo, add it to |data/urls.txt| at
the bottom of the list, and submit a pull request. It will be added ASAP.

The format is: TITLE URL-PATTERN ONION-URL

We only support the EXACT and WILDCARD matches in the URL Pattern
<https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/util_match-pattern>



-- 
Lucas Teixeira
https://codingrights.org
https://twitter.com/eletrorganico

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

