The table pointing associating clearnet domains with .onion addresses is maintained on a .csv on a git repo. Is this the first time someone does this kind of thing? Could this grow into a community maintained database?
https://github.com/Someguy123/HiddenEverywhere -------- <https://github.com/Someguy123/HiddenEverywhere#hiddeneverywhere>HiddenEverywhere A Firefox add-on to help TOR users find hidden services for ClearNet sites they use every day. Often, I tell people of Facebook's hidden service <http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/> only to hear they didn't know. It's been around since 2014, offering TOR users additional security, compared to the Clearnet. The most recent encounter with someone who actively used TOR for their daily activities had me think, "what if Firefox could tell you when a site you're using has a hidden service, even if you're stuck behind a Cloudflare Captcha?". And thus, this extension was born. When you visit a site such as LiteVault.net <https://www.litevault.net> or Facebook.com, the extension will inform you that you should be using the hidden service, with a direct link to it. [...] <https://github.com/Someguy123/HiddenEverywhere#new-domains>New Domains To add a new domain, simply fork the repo, add it to |data/urls.txt| at the bottom of the list, and submit a pull request. It will be added ASAP. The format is: TITLE URL-PATTERN ONION-URL We only support the EXACT and WILDCARD matches in the URL Pattern <https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/util_match-pattern> -- Lucas Teixeira https://codingrights.org https://twitter.com/eletrorganico -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
