<div class="gmail_quote">On Thu, Aug 20, 2009 at 17:29, Tom Hek <span dir="ltr"><<a href="mailto:tor@tomhek.nl">tor@tomhek.nl</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA1<div><div></div><div class="h5"><br>
<br>
On Aug 20, 2009, at 23:02 PM, KT wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Exit node freeMe69 [1] is injecting the following snippet to response body:<br>
<br>
<script type="text/javascript"<br>
src="<a href="http://s.tobban.com/solver/cpt.php" target="_blank">http://s.tobban.com/solver/cpt.php</a>"></script><br>
<br>
[1] <a href="http://tinyurl.com/mz9d7e" target="_blank">http://tinyurl.com/mz9d7e</a><br>
</blockquote>
<br></div></div>
It's actually injected by it's ISP, Comcast. The IP which <a href="http://s.tobban.com" target="_blank">s.tobban.com</a> resolves to is assigned to Comcast. I don't think the exit node admin can't do anything about it.</blockquote>
<div><br></div><div>Wow, that sort of script injection sounds like something that the FCC might have a problem with. </div></div>