openrightsgroup / blocked-org-uk

Template front-end code, markup, style-sheets, images and other assets for the Censorship Monitoring Project (blocked.org.uk)
https://www.blocked.org.uk/
GNU General Public License v3.0
13 stars 5 forks source link

Flag malware C2 domains and prevent testing #345

Open gwire opened 6 years ago

gwire commented 6 years ago

We should have a mechanism to prevent, or restrict, retesting of former malware command and control domains.

Currently, what I believe is currently happening is

For the tests originating on the linux VMs, it's been easy to ignore warnings about Windows malware infections - but someone running a Pi-based probe on a mixed-use network may not be aware of this as a side-effect. (This risk should be made clear to volunteers using probes.)

dantheta commented 6 years ago

There is now a "restricted-malware" status for URLs in the control panel (/control/urls). Setting this status will remove the URL from the retesting cycle and will disallow the submission of live checks through the frontend.

JimKillock commented 6 years ago

I think we need to do some text changes to finish @gwire's request, so the risk is clear to users. I received a letter from Virgin for instance. People may worry that the probes have been compromised.

Also @gwire did you mean for us to do large scale imports to check?

edjw commented 5 years ago

Where would the text changes be? In the information we send to potential probe owners?