The point is that the "pattern" to search for the ransomware shall be "as explicit as possible" with reasonable/decent Regexp.
If we can make such kind of view/search from Ahmia point of view, being a trustful non-profit entity, we can get-out the list of ransomware trough the search engine pattern, and from there extract/import a blocklist? That would be a way to "avoid" integrating any kind of "content blocking" feature into Tor2web, but leaving this feature to an external party? On 12/16/14 5:09 AM, Juha Nurmi wrote: > With Ahmia search I am gathering malware URLs, see latest update > https://twitter.com/AhmiaNews/status/544698681493319681 > > Cheers, > Juha > > > > _______________________________________________ > Tor2web-talk mailing list > [email protected] > http://lists.globaleaks.org/mailman/listinfo/tor2web-talk -- Fabio Pietrosanti (naif) HERMES - Center for Transparency and Digital Human Rights http://logioshermes.org - https://globaleaks.org - https://tor2web.org - https://ahmia.fi
_______________________________________________ Tor2web-talk mailing list [email protected] http://lists.globaleaks.org/mailman/listinfo/tor2web-talk
