diff --git a/Appendix-C:-Test-Sites.md b/Appendix-C:-Test-Sites.md index 791f3fe..e37b496 100644 --- a/Appendix-C:-Test-Sites.md +++ b/Appendix-C:-Test-Sites.md @@ -46,8 +46,8 @@ If you would like to submit a test page to be added to this list, please post th ### :small_orange_diamond: Other - [AudioContext](https://audiofingerprint.openwpm.com/) - **h**ttps://audiofingerprint.openwpm.com/ -- [1] [Battery](https://pstadler.sh/battery.js/) - **h**ttps://pstadler.sh/battery.js/ -- [2] [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) - **h**ttp://lcamtuf.coredump.cx/yahh/ +- [Battery](https://pstadler.sh/battery.js/) 1 - **h**ttps://pstadler.sh/battery.js/ +- [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) 2 - **h**ttp://lcamtuf.coredump.cx/yahh/ - [DNS Leak](https://www.dnsleaktest.com/) - **h**ttps://www.dnsleaktest.com/ - [DNS Spoofability](https://www.grc.com/dns/dns.htm) - **h**ttps://www.grc.com/dns/dns.htm - [Evercookie](https://samy.pl/evercookie/) - **h**ttps://samy.pl/evercookie/ @@ -66,9 +66,9 @@ If you would like to submit a test page to be added to this list, please post th - [Resource://URI](https://www.browserleaks.com/firefox) - **h**ttps://www.browserleaks.com/firefox - [WebRTC IP Leak](https://www.privacytools.io/webrtc.html) - **h**ttps://www.privacytools.io/webrtc.html -[1] Since Firefox 52, the Battery Status API is now chrome/privileged access and is not accessible by web pages. +1 Since Firefox 52, the Battery Status API is now chrome/privileged access and is not accessible by web pages. -[2] This test is a PoC (proof of concept). You will need `layout.css.visited_links_enabled` set as `true`. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites, and many of those will not "leak" as the code is checking HTTP and the site has moved to HTTPS - i.e the full URL has changed. For best results: +2 This test is a PoC (proof of concept). You will need `layout.css.visited_links_enabled` set as `true`. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites, and many of those will not "leak" as the code is checking HTTP and the site has moved to HTTPS - i.e the full URL has changed. For best results: * Open a normal window in a vanilla Firefox. Clear everything (Ctrl-Shift-Del). * Go to http://www.cnn.com/ and http://www.foxnews.com/ * Go to the [test page](http://lcamtuf.coredump.cx/yahh/) and play a game (takes 30 seconds or so)