The table pointing associating clearnet domains with .onion addresses
is
maintained on a .csv on a git repo. Is this the first time someone does
this kind of thing? Could this grow into a community maintained
database?
https://github.com/Someguy123/HiddenEverywhere
--------
<https://github.com/Someguy123/HiddenEverywhere#hiddeneverywhere>HiddenEverywhere
A Firefox add-on to help TOR users find hidden services for ClearNet
sites they use every day.
Often, I tell people of Facebook's hidden service
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>
only to hear they didn't know. It's been around since 2014, offering
TOR
users additional security, compared to the Clearnet.
The most recent encounter with someone who actively used TOR for their
daily activities had me think, "what if Firefox could tell you when a
site you're using has a hidden service, even if you're stuck behind a
Cloudflare Captcha?".
And thus, this extension was born. When you visit a site such as
LiteVault.net <https://www.litevault.net> or Facebook.com, the
extension
will inform you that you should be using the hidden service, with a
direct link to it.
[...]
<https://github.com/Someguy123/HiddenEverywhere#new-domains>New
Domains
To add a new domain, simply fork the repo, add it to |data/urls.txt| at
the bottom of the list, and submit a pull request. It will be added
ASAP.
The format is: TITLE URL-PATTERN ONION-URL
We only support the EXACT and WILDCARD matches in the URL Pattern
<https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/util_match-pattern>
--
Lucas Teixeira
https://codingrights.org
https://twitter.com/eletrorganico