diff --git a/Appendix-A-Test-Sites.md b/Appendix-A-Test-Sites.md
index 4f89219..f6160e1 100644
--- a/Appendix-A-Test-Sites.md
+++ b/Appendix-A-Test-Sites.md
@@ -1,9 +1,9 @@
Here is a list of various websites in which to test your browser. You should enable Javascript (JS) on these sites for the tests to present a worst-case scenario. In reality, you can control JS and XSS (cross site scripting) on sites with extensions such as uBlock Origin to reduce the possibility of fingerprinting attacks
-### :small_orange_diamond: Browser Comparison [Defaults]
+🟪 Browser Comparison [Defaults]
- [PrivacyTests.org](https://privacytests.org/) - **h**ttps://privacytests.org/ [github](https://github.com/arthuredelstein/privacytests.org)
-### :small_orange_diamond: Fingerprinting
+🟪 Fingerprinting
These are good sources to grab information on your results in one hit, but [do not read too much into their entropy figures](https://github.com/arkenfox/user.js/wiki/4.1-Extensions#small_orange_diamond-%EF%B8%8F-anti-fingerprinting-extensions-fk-no) as the data is tainted, and don't assume you are a fingerprint expert, see [Testing your fingerprint](https://matt.traudt.xyz/p/SkxEFK1m.html#testing-your-fingerprint)
@@ -17,7 +17,14 @@ These are good sources to grab information on your results in one hit, but [do n
- [FingerprintJS](https://fingerprintjs.github.io/fingerprintjs/) Basic Version - **h**ttps://fingerprintjs.github.io/fingerprintjs/
- [Vytal](https://vytal.io/) - **h**ttps://vytal.io/
-### :small_orange_diamond: Multiple Tests [single page]
+
+🟪 Multiple Tests [multi-page]
+- [BrowserLeaks](https://www.browserleaks.com/) - **h**ttps://www.browserleaks.com/
+- [CanvasBlocker Test Pages](https://canvasblocker.kkapsner.de/test/) - **h**ttps://canvasblocker.kkapsner.de/test/
+- [Privacycheck](https://privacycheck.sec.lrz.de/index.html) - **h**ttps://privacycheck.sec.lrz.de/index.html
+ * [ETag](https://privacycheck.sec.lrz.de/passive/fp_etag/fp_etag.php) - **h**ttps://privacycheck.sec.lrz.de/passive/fp_etag/fp_etag.php
+
+🟪 Multiple Tests [single page]
- [Do I Leak?](https://www.doileak.com/) - **h**ttps://www.doileak.com/
- [HTML5 Test](https://html5test.com/) - **h**ttps://html5test.com/
- [IP/DNS Leak](https://ipleak.net/) - **h**ttps://ipleak.net/
@@ -26,26 +33,21 @@ These are good sources to grab information on your results in one hit, but [do n
* [GitHub](https://github.com/chromium/permission.site) - **h**ttps://github.com/chromium/permission.site
- [Whoer](https://whoer.net/) - **h**ttps://whoer.net/
-### :small_orange_diamond: Multiple Tests [multi-page]
-- [BrowserLeaks](https://www.browserleaks.com/) - **h**ttps://www.browserleaks.com/
-- [CanvasBlocker Test Pages](https://canvasblocker.kkapsner.de/test/) - **h**ttps://canvasblocker.kkapsner.de/test/
-- [Privacycheck](https://privacycheck.sec.lrz.de/index.html) - **h**ttps://privacycheck.sec.lrz.de/index.html
- * [ETag](https://privacycheck.sec.lrz.de/passive/fp_etag/fp_etag.php) - **h**ttps://privacycheck.sec.lrz.de/passive/fp_etag/fp_etag.php
-### :small_orange_diamond: Encryption / Ciphers / SSL/TLS / Certificates
+🟪 Encryption / Ciphers / SSL/TLS / Certificates
- [JA3](https://ja3er.com/) - **h**ttps://ja3er.com/
- [BadSSL](https://badssl.com/) - **h**ttps://badssl.com/
- [Qualys SSL Labs](https://www.ssllabs.com/ssltest/viewMyClient.html) - **h**ttps://www.ssllabs.com/ssltest/viewMyClient.html
- [Fortify](https://www.fortify.net/sslcheck.html) - **h**ttps://www.fortify.net/sslcheck.html
- [How's My SSL](https://www.howsmyssl.com/) - **h**ttps://www.howsmyssl.com/
-### :small_orange_diamond: Mozilla's Safe Browsing, Tracking Protection [github](https://github.com/mozilla/itisatrap)
+🟪 Mozilla's Safe Browsing, Tracking Protection [github](https://github.com/mozilla/itisatrap)
- [Attack](https://itisatrap.org/firefox/its-an-attack.html) - **h**ttps://itisatrap.org/firefox/its-an-attack.html
- [Blocked](https://itisatrap.org/firefox/blocked.html) - **h**ttps://itisatrap.org/firefox/blocked.html
- [Malware](https://itisatrap.org/firefox/unwanted.html) - **h**ttps://itisatrap.org/firefox/unwanted.html
- [Phishing](https://itisatrap.org/firefox/its-a-trap.html) - **h**ttps://itisatrap.org/firefox/its-a-trap.html
- [Tracking](https://itisatrap.org/firefox/its-a-tracker.html) - **h**ttps://itisatrap.org/firefox/its-a-tracker.html
-### :small_orange_diamond: Other
+🟪 Other
- [AudioContext](https://audiofingerprint.openwpm.com/) - **h**ttps://audiofingerprint.openwpm.com/
- [Cache Fingerprinting](https://cookieless-user-tracking.herokuapp.com/) - **h**ttps://cookieless-user-tracking.herokuapp.com/
* It does this by assigning a unique variable in a cached script (see [#436](https://github.com/arkenfox/user.js/issues/436#issuecomment-392069853))