Update GSoC 2021 authored by hackhard's avatar hackhard
......@@ -39,12 +39,12 @@ Here we can see that the status codes are `200`, but still there is a clear diff
* If `Tbb != Nb` we know that the specific Tor fingerprint is blocked.
##### HIGH LEVEL FLOW-CHART: #####
<!-- ##### HIGH LEVEL FLOW-CHART: #####
![image](https://user-images.githubusercontent.com/34208125/112789927-d4c52880-907b-11eb-96da-706d7cd25ab9.png)
One could find in more details [here](https://hackhard.github.io/my-blog//My-Approach-29-03).
-->
## Nearby Goals and Roadmap:
- [X] Get the website list ([Alexa](https://www.alexa.com/topsites) and [Moz](https://moz.com/top500))
- [ ] Check with a few handful websites :
......@@ -120,4 +120,4 @@ style F stroke-width:3px,fill:#f04
+ Use of dashed lines and boxes show the things that haven't been implemented as of now.
+ As of now K has been set to 150 (Experimental Analysis)
+ The Captcha Checking Module has been proposed recently, which enables the use of "captcha" in the requests path from the responses we get while we load a website.
+ I've also proposed to check the final status code for a website redirected to another ([Mastercard](https://www.mastercard.de/) redirects to [this link](https://www.mastercard.de/de-de.html), and thus checking status code for "this link". Similar example would be for http://adsabs.harvard.edu/ which redirects to [here1](https://ui.adsabs.harvard.edu/) but for tor it redirects sometimes to [here2](http://adsabs.harvard.edu/cgi-bin/access_denied).
\ No newline at end of file
+ I've also proposed to check the final status code for a website redirected to another ([Mastercard](https://www.mastercard.de/) redirects to [this link](https://www.mastercard.de/de-de.html), and thus checking status code for "this link". Similar example would be for http://adsabs.harvard.edu/ which redirects to [here1](https://ui.adsabs.harvard.edu/) but for tor it redirects sometimes to [here2](http://adsabs.harvard.edu/cgi-bin/access_denied).H
\ No newline at end of file