[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21952 [User Experience]: Increasing the use of onion services through automatic redirects and aliasing
#21952: Increasing the use of onion services through automatic redirects and
aliasing
-----------------------------+-----------------------
Reporter: linda | Owner: linda
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: User Experience | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------+-----------------------
Comment (by cypherpunks):
If it will be useful here is my collection of 290 clearnet to onion rules.
It is the personal continuation of "darkweb-everywhere" but does not
include the proofs. Most of them are official mirrors, some addresses are
unofficial but useful mirrors, obvious or potential scam websites were not
added. To use them, just copy the rules to the HTTPSEverywhereUserRules
folder inside your Tor Browser profile. Since the goal was just to collect
all such addresses, I didn't bother with cleaning obsolete rules.
Nevertheless it is up to date and contains most of the major websites that
has onion addresses. But Facebook is turned off by default since that
would make the user fingerprintable, is there a way to use the redirection
only if the person visits facebook.com?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21952#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs