47
Comments (17)
sorted by:
4
BidenSmellsKids [S] 4 points ago +6 / -2

www.google.com

^^^ they can be deceiving

2
Kag_Maga 2 points ago +2 / -0

Yeah mods should probably remove the ability to do this! Good point

1
deleted 1 point ago +1 / -0
3
OneTypoComment 3 points ago +3 / -0

I'm deporting anybody who posts url shorteners.

2
StableGeniusTrump 2 points ago +2 / -0

I deported someone yesterday that was just posting spam. Looked at all their posts and it was the same BS link...couldn’t believe someone didn’t give them the boot sooner

2
deleted 2 points ago +2 / -0
1
BidenSmellsKids [S] 1 point ago +3 / -2

I'm seeing cleverly hidden urls that go to trackers, some even redirect right back here so it looks like nothing happened, lots of shortened urls.

2
deleted 2 points ago +4 / -2
1
BidenSmellsKids [S] 1 point ago +2 / -1

http://www.google.com

and how about this one?

0
deleted 0 points ago +1 / -1
1
deleted 1 point ago +1 / -0
2
BidenSmellsKids [S] 2 points ago +3 / -1

Brave browser is forked from chromium and the security engineer is a TDS diveristy hire, think again.

1
GarudaOne 1 point ago +1 / -0

What about Waterfox? As far as I can tell, it's a fork from Firefox but it's a one man operation.

-1
BidenSmellsKids [S] -1 points ago +1 / -2

I have spent a long time thinking about this, and just use Firefox with httspeverywhere, and one of those cookie blocking plugins. Brave's intentions are right, but they don't really have the team to do what they want, and it shows because they just forked Chromium

1
deleted 1 point ago +1 / -0
1
trauncher 1 point ago +1 / -0

The author may be a fuckhead, but Brave is still better than most. also, the Dissenter browser is based on chromium, stripped down, spyware removed, etc. its not bad either.

1
Romans12 1 point ago +1 / -0

A ghetto checking script for linux:

cat linklook.sh  
\#!/bin/bash   
bungle=`/bin/echo $1 | /bin/sed  's/\:\/\//\[\:]\[\/\]\[\/\]/g'`  

 /bin/echo "### All URIs defanged by replacing :// [:][/][/]. This is to avoid accidental clicks."  

/bin/echo "### This is where $bungle redirects leads. Commands are included so you may know what I'm doing."
/bin/echo " " /bin/echo "/usr/bin/curl -D headers.txt $bungle "
/usr/bin/curl -D /var/tmp/headers.txt $1 2>/dev/null | /bin/sed 's/\:\/\//\[\:]\[\/\]\[\/\]/g'`

/bin/echo " "
/bin/echo " "
/bin/echo "### Captured http headers from headers.txt: "
/bin/echo " "
/bin/sed 's/\:\/\//\[\:]\[\/\]\[\/\]/g' /var/tmp/headers.txt