Delivery-Date: Fri, 10 Jun 2016 16:16:39 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [138.201.14.202])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B3A751E0B0B;
	Fri, 10 Jun 2016 16:16:37 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id C6B36E14CD;
	Fri, 10 Jun 2016 20:16:31 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1B283E127B
 for <tor-talk@lists.torproject.org>; Fri, 10 Jun 2016 20:16:27 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id BrDKQyEzsSHi for <tor-talk@lists.torproject.org>;
 Fri, 10 Jun 2016 20:16:27 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id CE4E8E0DD5
 for <tor-talk@lists.torproject.org>; Fri, 10 Jun 2016 20:16:26 +0000 (UTC)
Received: from piha.riseup.net (unknown [10.0.1.163])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id 59E591A24BF
 for <tor-talk@lists.torproject.org>; Fri, 10 Jun 2016 20:16:23 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
 t=1465589783; bh=d4wgH10f8FxcRvy2QmE7SN6+NG85E4xm2kCRQsYSHpA=;
 h=Date:From:To:Subject:In-Reply-To:References:From;
 b=b98G+zun0W6hAsbU6M/pzhJT5njUARYbWPkT+bqGcITcwhfsGLM+V0+epvaKeeKf1
 Lx8p4f1Qzk/osKJhH3fDuXtea0voNdbWi/kNx2Y+To15dIQYegnTeqOeMZAGXGv1ep
 aNg1GIWW/0HC2ICEsZWLRV4kvmzPC2CUjc51Sr9Y=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: notfriendly) with ESMTPSA id 3AD151C027B
MIME-Version: 1.0
Date: Fri, 10 Jun 2016 16:16:23 -0400
From: Not Friendly <notfriendly@riseup.net>
To: tor-talk@lists.torproject.org
In-Reply-To: <575B1B5C.4030705@codingrights.org>
References: <575B1B5C.4030705@codingrights.org>
Message-ID: <4fe26b9ae39be225735e0c7eb89f407d@riseup.net>
Subject: Re: [tor-talk] Firefox add-on tells when website on clearnet has
 .onion
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 2016-06-10 15:56, Lucas Teixeira wrote:
> The table pointing associating clearnet domains with .onion addresses 
> is
> maintained on a .csv on a git repo. Is this the first time someone does
> this kind of thing? Could this grow into a community maintained 
> database?
> 
> https://github.com/Someguy123/HiddenEverywhere
> 
> --------
> 
> 
> 
> <https://github.com/Someguy123/HiddenEverywhere#hiddeneverywhere>HiddenEverywhere
> 
> A Firefox add-on to help TOR users find hidden services for ClearNet
> sites they use every day.
> 
> Often, I tell people of Facebook's hidden service
> <http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>
> only to hear they didn't know. It's been around since 2014, offering 
> TOR
> users additional security, compared to the Clearnet.
> 
> The most recent encounter with someone who actively used TOR for their
> daily activities had me think, "what if Firefox could tell you when a
> site you're using has a hidden service, even if you're stuck behind a
> Cloudflare Captcha?".
> 
> And thus, this extension was born. When you visit a site such as
> LiteVault.net <https://www.litevault.net> or Facebook.com, the 
> extension
> will inform you that you should be using the hidden service, with a
> direct link to it.
> 
> [...]
> 
> 
>   <https://github.com/Someguy123/HiddenEverywhere#new-domains>New 
> Domains
> 
> To add a new domain, simply fork the repo, add it to |data/urls.txt| at
> the bottom of the list, and submit a pull request. It will be added 
> ASAP.
> 
> The format is: TITLE URL-PATTERN ONION-URL
> 
> We only support the EXACT and WILDCARD matches in the URL Pattern
> <https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/util_match-pattern>
> 
> 
> 
> --
> Lucas Teixeira
> https://codingrights.org
> https://twitter.com/eletrorganico
Quick question on the Facebook Onion Service. You said that some people 
say they didn't know about the onion servie for Facebook? Does Facebook 
show a notice (or couldn't they auto redirect) about the Onion Service 
whenever you login through Tor? That would definally imporve awareness. 
Also the plugin could become community updated over time. Maybe at some 
point the Tor Project could even fork the plugin (if open source) and 
build similar support into Tor Browser itself.

-- 
Not Friendly
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

