PunyCode Protection

Warns on clicking links and arriving into sites which uses PunyCode.

You will need to install an extension such as Tampermonkey, Greasemonkey or Violentmonkey to install this script.

You will need to install an extension such as Tampermonkey to install this script.

You will need to install an extension such as Tampermonkey or Violentmonkey to install this script.

You will need to install an extension such as Tampermonkey or Userscripts to install this script.

You will need to install an extension such as Tampermonkey to install this script.

You will need to install a user script manager extension to install this script.

(I already have a user script manager, let me install it!)

You will need to install an extension such as Stylus to install this style.

You will need to install an extension such as Stylus to install this style.

You will need to install an extension such as Stylus to install this style.

You will need to install a user style manager extension to install this style.

You will need to install a user style manager extension to install this style.

You will need to install a user style manager extension to install this style.

(I already have a user style manager, let me install it!)

Autor
jcunews
Dnevne instalacije
0
Ukupnih instalacija
87
Ocjene
3 0 0
Verzija
1.0.4
Stvoreno
21.04.2017.
Ažurirano
05.04.2021.
Size
9,07 KB
Licenza
N/A
Primjenjuje se
Sve stranice

This is a protection against PunyCode abuse as described in below article.

https://arstechnica.com/security/2017/04/chrome-firefox-and-opera-users-beware-this-isnt-the-apple-com-you-want/

Notes:

  • Only sites whose host name uses Latin-extended or Latin-like characters, will be warned.

  • When clicking on a static link, confirmation dialog will be triggered only if points to a different site whose host name contains suspicious punycode (as described above).

  • Scripts will still be able to navigate to a possibly fake website in the current tab without triggering the confirmation prompt. However, upon arriving to the website, the user will still be prompted with a confirmation dialog.

  • Scripts that open a possibly fake website in a new tab will trigger the confirmation prompt.