Why is the US Green Party's site blocked?(github.com) |
Why is the US Green Party's site blocked?(github.com) |
The annoying thing is not the false positives: these things happen, and mostly it's not all that urgent to resolve immediately. The annoying thing is a total lack of obvious appeals process to resolve a false positive. At least the OP's example is on GitHub and thus can easily be issued.
It took almost 4 months to get through to someone who would accept my problem wasn't forgetting my password.
In the end, I was pointed to their third provider and told "sort it out yourself, not our problem". Thankfully that other company had a reasonable-ish appeals process...
...obviously I got relisted in their db a few times but things seem to have calmed down now.
Instead of designing our systems as though they all face the hostile public Internet like Google, why not instead police all of the public Internet as though it's our internal network? That way we don't need to adopt any actual security practices. What could go wrong?
As you saw, basically everything, all the time.
I actually moved energy supplier a few months ago. I had a good quote from a new supplier, and when I tried to sign in to see how close the quote from my old supplier was their site wouldn't load in my browser, tried again a day later, no joy. OK cool, bye then.
Surprisingly, Amazon does not block customers they put on this list.
Fortunately, since I build multi-lingual web sites, I was able to get an exemption from the security department.
(No, I don't use Google Translate to translate web sites. The company has three internal and two external professional translators for that. But sometimes when I'm copying-and-pasting between versions, I like a little reassurance that what I'm pasting is what I think it is.)
Currently however, providers are bound by EU mandates to treat every packet the same (roughly speaking).
I hope it stays that way.
[1] - https://www.techradar.com/uk/news/ofcom-to-review-uks-net-ne...
Give them some time to react. My wife complained to me she could not visit a website (I run Pi-Hole on our network, and our mobile devices get routed to it even on external networks). I looked through the logs, figured the offending rule, contacted the maintainer, and they fixed it within a few hours.
The issue has been up for one hour thus far.
False-positives, things that are good defaults but advanced users should be able to bypass, or just plain unfortunately necessary workarounds are certainly all issues though. I think user available fallbacks can be useful sometimes for that reason. Like at a site using 802.1x auth, set it up so users can append "-noblock" to their login and then it'll change them into a different VLAN which can just point at a different DNS (or alternately Unbound supports views for split-brain DNS).
In either case, blocklistproject interprets spam ad vendors as damage and routes around them.
A relatively common corporate practice, honestly. It's a shame more people aren't aware of it.
https://webcache.googleusercontent.com/search?q=cache:HWH6z4...
Perhaps they have fixed it in the past 3 weeks, maybe they haven't.
From yesterday, so not fixed -
https://webcache.googleusercontent.com/search?q=cache:rMUgla...
Also love the way it's signed, the persons online profile is "I'm Black Hat SEO Expert" if anyone wants to write any Green policy I guess contact them?
Having been on their side it can sometimes be very difficult to mitigate without manual approval. This is not automated - it's done by humans and they adjust their patterns against any automatic mitigation attempts.
Not if the site polices user-generated content.
It's fraud not spam, you never got to watch the fight after paying - https://ici.radio-canada.ca/recit-numerique/2140/adcenter-hy...
And 6 weeks ago it might have been ISIS spam or a link to a exe or phishing.
> and any site that accepts user-generated content is susceptible to it
This site doesn't have user-generated content/events/calendar, it's employee generated.
So maybe that only has been an issue for 3 weeks (which is bad enough), but all things considered, it’s possible it’s been like this for years.
No outrage to see here, please move along
I use Pi-Hole on EdgeOS with a second server with Docker as backup. I also have NextDNS as fallback. I'll probably switch to OPNsense at some point though.
Probably not related, but worth mentioning the coincidence just because it was such a good article https://www.newyorker.com/magazine/2021/08/09/the-big-money-...
I explained the guy on the other line the reason why that happened and he told me not to worry about it, but warned me that they were going to monitor my traffic by protocol for a few hours, so I should avoid looking at porn in the meantime. I replied that I wouldn't look at porn on the work laptop, and he told me that the warning was also routine and that I wouldn't believe what people watch during working hours.
Probably not, judging by the gp's use of the term "end to end encrypted". Nearly every site uses HTTPS, so if they were really doing MITM, either everything would be broken (because the root certs aren't installed), or everything works. My guess is that his employer's network has some sort of network filter installed, and "end to end encrypted" is a classification category for sites that is blocked for whatever reason.
As I mentioned before, the methodology requires publishing a trusted cert to endpoints. This is done with GPOs or whatever RMM tool is used to manage workstations + MDM to push to mobile.
You will find this implemented in nearly any high-security network environment (finance, government, etc.), primary schools, and a lot of miscellaneous businesses.
That's incorrect. There's a call to action to register to submit an event here:
https://www.gp.org/earth_day_to_may_day_events_calendar
That's how the spam got in.
Edit: here, I made one for you: https://www.gp.org/janon/aaron695_hello
Edit2: it's deleted, looks like someone is finally doing cleanup
They did the same with a 'job ad' on the hosts web site -
https://webcache.googleusercontent.com/search?q=cache:2Uw0_n...