Open zingmars opened 6 years ago
Hello! What page is this on? Could you run the following debugging code in your Badger's background page console and share what gets printed?
(function () {
const STR = "gyazo";
console.log("**** ACTION_MAP for", STR);
_.each(badger.storage.getBadgerStorageObject('action_map').getItemClones(), (obj, domain) => {
if (domain.indexOf(STR) != -1) console.log(domain, JSON.stringify(obj, null, 2));
});
console.log("**** SNITCH_MAP for", STR);
_.each(badger.storage.getBadgerStorageObject('snitch_map').getItemClones(), (sites, domain) => {
if (domain.indexOf(STR) != -1) console.log(domain, JSON.stringify(sites, null, 2));
});
}());
To get to the background page console in Chrome, visit chrome://extensions
, make sure "Developer mode" is enabled, click on the "background page" link in Privacy Badger's cell, and select the Console tab.
In Firefox, visit about:debugging
, enable add-on debugging, click Debug next to Privacy Badger, click the OK button on the popup warning about remote debugging, and enter the above script into the console after the >>.
It's a chat page that allows people to embed their own avatars using direct URLs. The site is http://overthegun.org/shoutbox.php. I can't guarantee that someone with an avatar that contains a gyazo URL will be online, in which case you can just post a message using an avatar like https://i.gyazo.com/31468295c37a2d8613ef2f8c94655ab4.png (no need to log in) and delete it afterwards
Output of the command -
**** ACTION_MAP for gyazo
22:44:43.415 VM201:5 bot.gyazo.com {
"dnt": false,
"heuristicAction": "block",
"nextUpdateTime": 1510410072525,
"userAction": ""
}
22:44:43.416 VM201:5 gyazo.com {
"dnt": false,
"heuristicAction": "block",
"nextUpdateTime": 1510044713704,
"userAction": ""
}
22:44:43.416 VM201:5 i.gyazo.com {
"dnt": false,
"heuristicAction": "allow",
"nextUpdateTime": 1527399123958,
"userAction": ""
}
22:44:43.417 VM201:7 **** SNITCH_MAP for gyazo
22:44:43.419 VM201:9 gyazo.com [
"unknowncheats.me",
"fextralife.com",
"reddit.com"
]
It seems that i.gyazo.com is blocked by default, even though i.gyazo.org only serves images.