Author Topic: Important to have HTTPS-EVERYWHERE extension in your browser..  (Read 1842 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Else one could have visited a site like: -http://wehali.com
See: https://urlscan.io/result/07d3d6e6-b711-47bf-9498-0bfd9b45b079/
It is also a parked website at dan dot com with various site issues: https://sitecheck.sucuri.net/results/wehali.com

With https-everywhere installed you have to willfully open up to such an less secure website.
See: https://www.trustpilot.com/review/dan.com

Inline scripts on website:
Quote
HTML
-wehali.com/
15,438 bytes, 149 nodes

Javascript 25   (external 18, inline 7)
-www.googletagmanager.com/​gtm.js?id=GTM-TQWL3L
-www.google-analytics.com/​analytics.js
INLINE: /* * This entire block is wrapped in an IIFE to prevent polluting the scope of
495,371 bytes

INLINE: (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[
698 bytes

INLINE: (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),e
330 bytes

-widget.trustpilot.com/bootstrap/v5/​tp.widget.bootstrap.min.js
INLINE: timeZone = new Date().getTimezoneOffset(); document.cookie = 'time_zone_offset='
122 bytes

-cdn2.dan.com/assets/vendor/​svg4everybody-d91703fef1c03c352bc6bfb3b8d719739a0ca72ce138fc9a4ec08c9fab5e5b3a.js
INLINE: svg4everybody();
16 bytes

-cdn2.dan.com/packs/js/runtime~public/​fonts-7e31f00792f6fe967e68.js
-cdn1.dan.com/packs/js/public/​fonts-8d65837914afaf1be02c.chunk.js
-cdn3.dan.com/packs/js/runtime~public/​shared-646d851134790b7c4bd5.js
-cdn2.dan.com/packs/js/​34-29d606067e32c48a7b12.chunk.js
-cdn1.dan.com/packs/js/public/​shared-e17b32101598656aa0c6.chunk.js
INLINE: window.locale = "en-us" function setI18nLocale() { if(typeof(window) === "unde
378 bytes

-ajax.googleapis.com/ajax/libs/jquery/1.6.2/​jquery.min.js
INJECTED

-cdn1.dan.com/assets/public/​i18n-53480ffbafea9fe790f64e209ec2e1736f24b2fcb19721efdc92d076ef38ce30.js
-cdn0.dan.com/packs/js/runtime~public/​app-44748be1cadd2d7eff1d.js
-cdn3.dan.com/packs/js/​0-9e9c29f1d009d02c814a.chunk.js
-cdn3.dan.com/packs/js/​1-10619a85ca30c84a180f.chunk.js
-cdn3.dan.com/packs/js/public/​app-99efc041283ee824a6bd.chunk.js
-cdn0.dan.com/packs/js/runtime~public/​product-c70d6969e53aebcd0730.js
-cdn0.dan.com/packs/js/​32-95a1a70dd36751258d48.chunk.js
-cdn1.dan.com/packs/js/public/​product-e1ed335e2095ba4913a5.chunk.js
INLINE: I18n.translations['en-us'] = I18n.extend((I18n.translations['en-us'] || {}), {"p
3,996 bytes

CSS 5   (external 1, inline 4)
-cdn3.dan.com/assets/​public-383d9bbfa9cf59160c435f7051e95acbdb43a776bcf4357673ccad9fd0c3699e.css
INJECTED

INLINE: -a.gootranslink:link {color: #0000FF !important; text-decoration: underline !impo
2,944 bytes INJECTED

INLINE: .BDTLL_icon_ok { background-image: url(data:image/png;base64,iVBORw0KGgoAAAA
31,825 bytes INJECTED

INLINE: .BDTLL_status { cursor: pointer; display: inline; margin-right: 3px;
595 bytes INJECTED

INLINE: -a.gootranslink:link {color: #0000FF !important; text-decoration: underline !impo
2,944 bytes INJECTED

JSON 1   (external 0, inline 1)
INLINE: {"@context":"http://schema.org","@type":"LocalBusiness","@id":"-https://www.trust
558 bytes

Others 2   (external 0, inline 2)
INLINE: []
2 bytes

INLINE: null
4 bytes

There is 10% tracking and 20% ads on webpage being blocked, web analytics paused 2 (Google's).

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Re: Important to have HTTPS-EVERYWHERE extension in your browser..
« Reply #1 on: July 29, 2021, 10:52:58 PM »
One of the reasons why this is important, a http potential scam site,
see: https://urlscan.io/result/0a92a95a-aa5b-4fd6-bbed-651a7d316d06/

Flagged here: chrome-extension://bmejphbfclcpmpohkggcjeibfilpamia/blocked.html?ref=0&blockpageid=0

See: https://sitereport.netcraft.com/?url=https://bitcoincodeworld.com

But a 0.4/100 score here: https://www.scam-detector.com/validator/bitcoincodeworld-com-review/

4 to flag malicious, suspicious and phishing at VT: https://www.virustotal.com/gui/domain/bitcoincodeworld.com/detection

polonus

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!