twtxt

Timeline for https://eapl.me/twtxt.txt

🔄 Refresh timeline

👨‍💻 Login

Following: 16

tkanos https://twtxt.net/user/tkanos/twtxt.txt Remove

eaplme https://eapl.me/twtxt.txt Remove

eaplmx https://eapl.mx/twtxt.txt Remove

lyse https://lyse.isobeef.org/twtxt.txt Remove

prologic https://twtxt.net/user/prologic/twtxt.txt Remove

rrraksamam https://twtxt.net/user/rrraksamam/twtxt.txt Remove

darch https://neotxt.dk/user/darch/twtxt.txt Remove

shreyan https://twtxt.net/user/shreyan/twtxt.txt Remove

movq https://www.uninformativ.de/twtxt.txt Remove

bender https://twtxt.net/user/bender/twtxt.txt Remove

stigatle https://yarn.stigatle.no/user/stigatle/twtxt.txt Remove

darch http://darch.dk/twtxt.txt Remove

xuu https://txt.sour.is/user/xuu/twtxt.txt Remove

jason https://jasonsanta.xyz/twtxt.txt Remove

mckinley https://twtxt.net/user/mckinley/twtxt.txt Remove

eapl-mes-7-daily-links https://feeds.twtxt.net/eapl-mes-7-daily-links/twtxt.txt Remove


xuu
Reply to #peqf4kq
@eapl.me are ISPs still injecting code into HTTP in this the year 2023? I remember getting notices that my comcast modem is out of date pushed into websites back a decade ago.
7 months ago
💬 Reply


eapl.me
Reply to #flupfna
I've found that my ISP replaces HTTP sites with a "You haven't paid your bill" message. With HTTPS it only gives an error that the site is not accessible.
There's a similar behaviour in public places like airports ✈, or even some have malicious forms. I'm not sure if it's a general issue anymore.

Also,even on HTTPS some extensions inject scripts or hidden fields.

🤔
7 months ago
💬 Reply


mckinley
Reply to #flupfna
@xuu I caught AT&T doing this last year. They were also hijacking DNS queries if I remember correctly.
7 months ago
💬 Reply


⏭️ Next