Also, if you use duckduckgo as your default search engine, it looks like you 
can prepend !archive or !wayback (turns out !a goes to amazon, sigh).

John

> On Feb 2, 2019, at 14:08, Neil Van Dyke <n...@neilvandyke.org> wrote:
> 
> Justin Zamora wrote on 2/2/19 3:39 PM:
>> Thanks! I always forget about archive.org!
> 
> Semi-off-topic, but this is helpful for Racketeers recovering older Scheme 
> docs/discussion/code (some of the best thinking happened many years ago, and 
> is still relevant)...
> 
> Here's a useful Firefox Quick Search bookmark:
> 
> Name:  [SEARCH] ARCHIVE.ORG
> Location:  https://web.archive.org/web/%S
> Keyword:  a
> 
> Basically, whenever you get a normal Web decay 404 error, or some kind of 
> anti-abuse/anti-privacy blocking by the server, you can go to your browser's 
> location (URL) bar, and prepend "a" with a space, and press Enter/Return.  No 
> add-on required.  (Also, you might want to set the location bar to not send 
> your typing and mis-pastes to search engines, and to only do autocomplete 
> from your bookmarks, not from history or anything else.)
> 
> 
> (Aside: This is especially helpful if you're running through Tor with JS 
> disabled by default, because some useful news sites, especially, will 
> actively refuse to serve pages to a Tor exit node IP address with JS 
> disabled, and one popular CDN will also refuse to serve pages to this, 
> whether or not its site customers know it. Offhand, I can think of only one 
> news site that is Tor-hostile without usually having news articles readable 
> in Archive.org.  Note that you're leaking a bit to Archive.org and bugs it 
> runs, of course.)
> 
> (Further aside: I try, when mentioning Tor, not to inadvertently endorse it 
> too much, given that its security has often been overstated, which could be 
> very bad for people who actually desperately need that security... I've been 
> experimenting with using Tor mainly as a free low/moderate-security VPN for 
> most daily desktop Web browsing, because even sketchy and likely-compromised 
> Tor nodes have better reputations than my ISP, :) and for techie continual 
> learning, and sense of obligation.  I previously ran a proxy tunnel through 
> EC2 for this purpose, but that's not great, either, and I wanted to find a 
> solution for people who can't afford an extra ~$5/mo.  Tor seems not-great 
> against some sophisticated adversaries, though, and the situation seems 
> almost hopeless with the current de facto Web architecture -- without even 
> blackbox traffic analysis, potentially large numbers of compromised nodes, or 
> general endpoint vulnerabilities.  But it's good for a little privacy from 
> your awful ISP, open WiFi, etc., if you don't mind it being slow, and if, 
> like me, you are boring enough that you don't mind your mere use of Tor 
> presumably raising your profile a bit for actors more-sophisticated than your 
> ISP or compromised cafe/hotel WiFi.  Also, Tor Browser is more consistently 
> privacy&security-respecting than the other browsers, with possible wait&see 
> exception of Brave.  Example warning for more general audiences is on 
> "https://www.neilvandyke.org/replicant/";.)
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "Racket Users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to racket-users+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.



-- 
You received this message because you are subscribed to the Google Groups 
"Racket Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to racket-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to