tkanos https://twtxt.net/user/tkanos/twtxt.txt Remove
eaplme https://eapl.me/twtxt.txt Remove
eaplmx https://eapl.mx/twtxt.txt Remove
lyse https://lyse.isobeef.org/twtxt.txt Remove
prologic https://twtxt.net/user/prologic/twtxt.txt Remove
rrraksamam https://twtxt.net/user/rrraksamam/twtxt.txt Remove
darch https://neotxt.dk/user/darch/twtxt.txt Remove
shreyan https://twtxt.net/user/shreyan/twtxt.txt Remove
movq https://www.uninformativ.de/twtxt.txt Remove
bender https://twtxt.net/user/bender/twtxt.txt Remove
stigatle https://yarn.stigatle.no/user/stigatle/twtxt.txt Remove
darch http://darch.dk/twtxt.txt Remove
xuu https://txt.sour.is/user/xuu/twtxt.txt Remove
jason https://jasonsanta.xyz/twtxt.txt Remove
mckinley https://twtxt.net/user/mckinley/twtxt.txt Remove
eapl-mes-7-daily-links https://feeds.twtxt.net/eapl-mes-7-daily-links/twtxt.txt Remove
xuu
Reply to #peqf4kq
@eapl.me are ISPs still injecting code into HTTP in this the year 2023? I remember getting notices that my comcast modem is out of date pushed into websites back a decade ago.
7 months ago
💬 Reply
eapl.me
Reply to #flupfna
I've found that my ISP replaces HTTP sites with a "You haven't paid your bill" message. With HTTPS it only gives an error that the site is not accessible.
There's a similar behaviour in public places like airports ✈, or even some have malicious forms. I'm not sure if it's a general issue anymore.
Also,even on HTTPS some extensions inject scripts or hidden fields.
🤔
7 months ago
💬 Reply
mckinley
Reply to #flupfna
@xuu I caught AT&T doing this last year. They were also hijacking DNS queries if I remember correctly.
7 months ago
💬 Reply