polonus
961
Test your domain to be GDPR-compliant: https://2gdpr.com/
These our forums had the following issues:
Prior consent to other than strictly necessary cookies (ePrivacy)
Possible problems! Hide
What’s the Problem:
Cookies installed during the loading of pages are not strictly necessary. For EU users these cookies can be installed after obtaining prior consent (Rec. 30 and Rec. 32 of the GDPR)
How to Solve it:
On the site you need to install prominent and specific cookie-banner with a consent form to get user consent, or to block cookies in case of consent refusal. You can create such cookie consent here
Pages list:
Below are the webpages loaded and cookies that require prior consent from EU users to be installed:
https://forum.avast.com/index.php?topic=315188.msg1675451
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?action=help
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?action=search
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?board=125.0
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?topic=315479.msg1675505
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?board=126.0
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?board=127.0
Cookie (Google Analytics): _gid; _ga; _gat;
https://forum.avast.com/index.php?board=128.0
Cookie (Google Analytics): _gid; _ga; _gat;
Like in Austria this could mean Google Analytics can no longer be used in the EU.
Steps that could be taken to make Google ‘Analytrics’ being more privacy compliant, script:
polonus
polonus
962
I should admit, that the script that is being presented in the previous posting (quote)
is more or less a form of window-dressing, because that IP has being loaded from Googles servers beforehand anyway. That IP has been made pseudo-anonymous. Google can calculate it anyway.
Actually google-analytics is ‘spook-ware’, coming with all that javascript included.
Through just this line of code Google knows the IP through that script being loaded,
So as coming from the EU we users may find websites outside of the EU blocking us.
polonus
polonus
963
Whenever one finds oneself blocked from CloudFlare’s, it could be helpful to know the real IP of that particular website: https://shadowcrypt.net/tools/cloudflare
Other interesting tools can be found there also: https://shadowcrypt.net/tools/tor-checker
And this one: https://shadowcrypt.net/tools/asn-finder
Random example:
Results of 122.161.48.17
122.161.48.0/20
PACNET (proxy-registered route object)
This route object is for a PACNET customer route which is
This route object was created because no existing route
ANC peers filter based on these objects this route
122.161.48.0/24
polonus
polonus
964
Tested IP leaks for my browser VPN, see: https://www.whatsmydns.net/#A/138.68.180.132
at //www.top10vpn.com/tools/do-i-leak/
Results:
IPv4/IPv6 No Leak
DNS No Leak
WebRTC No Leak
Geolocation No Leak
Additional Tests No Leak
Testing the Great Firewall now using BLOCKY:
https://blocky.greatfire.org/
Recently blocked: https://en.greatfire.org/https/forum.avast.com/index.php%
No censorship detected October last: https://blocky.greatfire.org/detail/169946/http%3A%2F%2Fforum.avast.com
polonus
polonus
965
polonus
966
polonus
967
Information to circumvent CloudFlare blocking from behind a proxy or VPN,
use the CloudFlare resolver tool: https://shadowcrypt.net/tools/cloudflare
and also via the info here at https://waf-bypass.com for CloudFlare, Amazon etc. etc.
Also handy when the newly planned EU DNS with URL-filter will be implemented,
or whenever one is being blocked working a tor browser.
Big Brother will be inviting you to a cat- and mouse-game for the last remnants of your privacy and free info gathering. That is what the future has in store for us all (opinion-checking etc.).
Test your WAF online here: https://labs.cloudbric.com/wafer/waf (change DNS to verify)
polonus
polonus
968
polonus
969
20.000 Word Press CMS websites found vulnerable to critical PHP leaks.
Only 31% of such websites have chosen to patch:
https://wordpress.org/plugins/php-everywhere/advanced/
See how weak PHP and fatal errors in coding can easily produce disaster:
https://www.fatalerrors.org/a/php-weak-type-code-commadn-injection.html
So with PHP-encoded CMS: “Don’t EVER trust user input anywhere”.
Have a slick website developed. But forget to spend money on any maintanance.
So weak PHP, later a small exploit, and your website can get hacked and worse.
polonus
polonus
970
Various online tools, example : https://online-toolz.com/tools/html-validator.php
When valid you get “valid”. Valid found here: -fusedeck.com (random example).
polonus
polonus
971
Scanned this particular random site through
@ https://www.web-malware-removal.com/website-malware-virus-scanner/
Cloaking found on the webserver.
Server Details:
apache
Google and Web-Browser Content different!
Google: 63763 bytes Firefox: 63967 bytes, Diff: 204 bytes
l" class=“rss_link”>rss twitter …
Above was found using Free Website Malware / Virus Scan
The cloaking was not found to rside on the website while scanning at:
https://isithacked.com/check
polonus (3rd party cold recon website security analyst and website error-hunter)
polonus
972
polonus
973
Stable Trackers List - intresting:
https://newtrackon.com/list
Random examples:
-dp://tracker.dler.com:6969/announce
-udp://fe.dealclub.de:6969/announce
-udp://movies.zsw.ca:6969/announce
-udp://6ahddutb1ucc3cp.ru:6969/announce
udp://abufinzio.monocul.us:6969/announce
-http://btracker.top:11451/announce
-udp://vibe.sleepyinternetfun.xyz:1738/announce
-udp://tracker.torrent.eu.org:451/announce
-udp://tracker.auctor.tv:6969/announce
-https://tr.burnabyhighstar.com:443/announce
-udp://tracker.sylphix.com:6969/announce
-udp://torrentclub.space:6969/announce
-udp://tracker.srv00.com:6969/announce
-udp://tracker.opentrackr.org:1337/announce
etc. etc.
Not being flagged elsewhere, see: https://quttera.com/detailed_report/torrentclub.space
polonus
polonus
974
How did you score here? Instant Security Scan by Zscaler’s.
Re: http://securitypreview.zscaler.com/#
pol
DavidR
975
I don’t know if this was also your intent as the http prefix triggers Firefox http every check.
Allowing it does a redirect to what is also an http page, which is pretty poor on the part of Zscaler when this is supposedly a security based check ???
So I didn’t proceed any further, who knows if they would then spring a ‘what are you doing visiting non https pages’ comment.
polonus
976
Hi DavidR,
Thank you for your well appreciated comments.
I gave the Zscaler online scanner info as I found it online.
There seems to exist more and more online that is not quite keeping up to standards as we have known them in the past
(from 1998 up and until now). Every av-vendor and also Zscaler has now jumped the data-slurping band-waggon.
Front-ends appearing like intelx.io and https://nitter.eu (Enter username). Intelligence for couch-potatoes. 
Then this for instance data towards a certain end (an utterly and completely random choice by me, pol):
https://metrics.torproject.org/rs.html#details/4AA0035604DF40E5BA20DBE88EF6D11432421BFA
&
https://udger.com/resources/ip-list/tor_exit_node
&
https://github.com/SecOps-Institute/Tor-IP-Addresses
To know what to be up against with cybercrime and alleged cybercrime, one has to study much, hence read and read.
Your adversary also does, so we cannot do without. So please go on and further comment the contents of this thread.
I just like to trigger end-users awareness. To generally being dumbed down is a process we all will undergo more and more anyway.
So to go up against and reverse this process a bit towards awarding and good ends is what I venture out for.
Sort of see that as my mission here as a website error-hunter of sorts.
your avast-forum-friend,
polonus
polonus
977
See what tracking techniques a website may use:
https://themarkup.org/blacklight?url= (A Real-Time Website Privacy Inspector
By Surya Mattu)
polonus