diff options
| author | CHEF-KOCH <[email protected]> | 2015-08-14 19:47:33 +0200 |
|---|---|---|
| committer | CHEF-KOCH <[email protected]> | 2015-08-14 19:47:33 +0200 |
| commit | 18a70f630b0b9adf0f373c35ddce11add23a5902 (patch) | |
| tree | 552c3b01378a2cd334f7aa4da58f654297c03138 | |
| parent | Update README.md (diff) | |
| download | nsablocklist-18a70f630b0b9adf0f373c35ddce11add23a5902.tar.xz nsablocklist-18a70f630b0b9adf0f373c35ddce11add23a5902.zip | |
* yet another small change
Signed-off-by: CHEF-KOCH <[email protected]>
| -rw-r--r-- | README.md | 31 |
1 files changed, 17 insertions, 14 deletions
@@ -8,30 +8,32 @@ This isn't yet another [hosts file](https://en.wikipedia.org/wiki/Hosts_(file)) This project includes ------------ -Basically the following stuff: -* An HOSTS file that includes all Servers/DNS that are known as NSA or GCHQ involved. +* An '[HOSTS.txt](https://github.com/CHEF-KOCH/NSABlocklist/blob/master/HOSTS.txt)' file that includes all Servers/DNS that are known as NSA or GCHQ involved. * An separate 'Super Ranges' file that includes a list of known IP ranges that are possible compromised (be careful with that!). -* An 'LICENSE' File to show the MITM license. -* The 'README' file that includes the latest news and updates, explanations,... -* An 'Problematic' file wich includes DNS/PTRs that are problematic. +* An '[LICENSE](https://github.com/CHEF-KOCH/NSABlocklist/blob/master/LICENSE)' File to shows the MITM license. +* The '[README](https://github.com/CHEF-KOCH/NSABlocklist/blob/master/README.md)' (this) file that includes the latest news, updates and explanations,... +* An '[problematic.txt](https://github.com/CHEF-KOCH/NSABlocklist/blob/master/problematic.txt)' file wich includes DNS/PTRs that are possible problematic for you. -Notice +Important Notice ------------ * A true list of compromised IPs would list the entire Internet, then on to the fuller range open mouth blabbering of blogs, email, chat rooms, texting, aided and abetted by the world's telecoms, postal services, and, most reliably, bedroom murmurings. -* I hope I can update the list monthly, feel free to open an issue ticket and report if you found more servers/IPs. -* I do not accept donations, I'm not doing this because I want money or hype I'm doing this because I didn't found a proper list on the net and because I want to share my knowledge for free with the world. I always think that such information should be available for everyone on the world. -* I do not 'hate' the NSA but I hate that everyone is automatically under the microscope and of course that there is no opt-out or transparency excpect lies and more lies (and some excuses ...yeah, we are doding this because terrorism, go f$ck yourself with that!) +* I do not accept donations, I'm not doing this because I want $$money or hype I'm doing this because I didn't found a proper list on the whole internet and of course I want to share my knowledge for free. I always think that such information should be available for everyone on the world. + + +Do you hate the NSA or other agencys? +------------ +* I do not _hate_ the NSA or other agencys but I really don't like that everyone is automatically under the microscope and of course that there is no opt-out or transparency excpect lies and more lies (and some excuses ...yeah, we are doing this because terrorism, go f$ck yourself with wuch statements!) +* Everyone have something to hide, passwords, privat data, accounts, .... Known problems that this hosts file can't fix: ------------ -* An HOSTS file is no guarantee, if the NSA is already in your system it's already to late. +* An hosts file is no guarantee, if the NSA is already in your system it's already to late. * HOSTS files are no guarantee that the NSA or any other attacker/organization could simply bypass it via 0day or other vulnerabilitys on your system/router. -* HOSTS files can't protect against attacks on the hardware, if the router is already compromised or comes with backdoors this list will be easily bypassed anyway. +* HOSTS files can't protect against attacks directly on/in the hardware, e.g. if the router is already compromised or comes with backdoors this list will be easily bypassed anyway. * Due the complex of the entire file I can't explain every single IP or PTR record. * The hosts file may present an attack vector for malicious software because the file could be modified to redirect the entire traffic e.g. adware or trojans can do this. -* .... ToDo: @@ -43,10 +45,11 @@ ToDo: - [ ] Monthly updates? - [ ] Find invalid entries or domains that aren't online anymore - [ ] Fix/merge all reported [issues](https://github.com/CHEF-KOCH/NSABlocklist/issues) +- [ ] Add explanation how to identify or check domains if they're compromised -This list is original based on 2007 published list (and includes my own modifications): +My list is original based on 2007 published Wikileaks information (and includes my own modifications): * [Cryptome](http://cryptome.info/0001/ip-tla.htm) -**Thanks goes to everyone which fights for the www security!** +**Thanks goes to everyone which fights for the www security! Give spying no chance!** |