Open gwire opened 6 years ago
There is now a "restricted-malware" status for URLs in the control panel (/control/urls). Setting this status will remove the URL from the retesting cycle and will disallow the submission of live checks through the frontend.
I think we need to do some text changes to finish @gwire's request, so the risk is clear to users. I received a letter from Virgin for instance. People may worry that the probes have been compromised.
Also @gwire did you mean for us to do large scale imports to check?
Where would the text changes be? In the information we send to potential probe owners?
We should have a mechanism to prevent, or restrict, retesting of former malware command and control domains.
Currently, what I believe is currently happening is
For the tests originating on the linux VMs, it's been easy to ignore warnings about Windows malware infections - but someone running a Pi-based probe on a mixed-use network may not be aware of this as a side-effect. (This risk should be made clear to volunteers using probes.)