[tor-talk] Firefox add-on tells when website on clearnet has .onion

Lucas Teixeira lucas at codingrights.org
Fri Jun 10 19:56:12 UTC 2016


The table pointing associating clearnet domains with .onion addresses is
maintained on a .csv on a git repo. Is this the first time someone does
this kind of thing? Could this grow into a community maintained database?

https://github.com/Someguy123/HiddenEverywhere

--------


  <https://github.com/Someguy123/HiddenEverywhere#hiddeneverywhere>HiddenEverywhere

A Firefox add-on to help TOR users find hidden services for ClearNet
sites they use every day.

Often, I tell people of Facebook's hidden service
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>
only to hear they didn't know. It's been around since 2014, offering TOR
users additional security, compared to the Clearnet.

The most recent encounter with someone who actively used TOR for their
daily activities had me think, "what if Firefox could tell you when a
site you're using has a hidden service, even if you're stuck behind a
Cloudflare Captcha?".

And thus, this extension was born. When you visit a site such as
LiteVault.net <https://www.litevault.net> or Facebook.com, the extension
will inform you that you should be using the hidden service, with a
direct link to it.

[...]


  <https://github.com/Someguy123/HiddenEverywhere#new-domains>New Domains

To add a new domain, simply fork the repo, add it to |data/urls.txt| at
the bottom of the list, and submit a pull request. It will be added ASAP.

The format is: TITLE URL-PATTERN ONION-URL

We only support the EXACT and WILDCARD matches in the URL Pattern
<https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/util_match-pattern>



-- 
Lucas Teixeira
https://codingrights.org
https://twitter.com/eletrorganico



More information about the tor-talk mailing list