Run all URLs through HTTPS Everywhere.

I started with https://github.com/EFForg/https-everywhere
commit 2f387958564289e452324c63bc9d60617f432241,

then added this pull request (fixes rewriter.js):
https://github.com/EFForg/https-everywhere/pull/12487

then further applied this tiny patch to make rewriter.js process a
single file, rather than a directory:
 for (var i = 2; i < process.argv.length; i++) {
-  processDir(process.argv[i]);
+  processFile(process.argv[i]);
 }

I then ran these commands (cribbed from a comment in rewriter.js):
https-everywhere$ ./makecrx.sh
https-everywhere$ cd rewriter
https-everywhere$ npm install
https-everywhere$ node rewriter.js ~/censorbib/references.bib

Signed-off-by: Philipp Winter <phw@nymity.ch>
This commit is contained in:
David Fifield 2017-09-06 12:59:40 -07:00 committed by Philipp Winter
parent 7c97c8395c
commit 242e038793

View file

@ -106,7 +106,7 @@
booktitle = {European Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2017},
url = {http://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
url = {https://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
}
@techreport{Wolfgarten2006a,
@ -151,7 +151,7 @@
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2016},
url = {http://dl.acm.org/authorize?N25517},
url = {https://dl.acm.org/authorize?N25517},
}
@inproceedings{Bocovich2016a,
@ -447,7 +447,7 @@
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2011},
url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
url = {https://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
}
@inproceedings{Ververis2015a,
@ -598,7 +598,7 @@
publisher = {CTU Publishing House},
title = {The {Eternity} Service},
year = {1996},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
url = {https://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
}
@techreport{Anderson2012a,
@ -606,7 +606,7 @@
title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network},
institution = {},
year = {2012},
url = {http://arxiv.org/pdf/1209.6398v1},
url = {https://arxiv.org/pdf/1209.6398v1},
}
@techreport{Anderson2013a,
@ -614,7 +614,7 @@
title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}},
institution = {University of Pennsylvania},
year = {2013},
url = {http://arxiv.org/pdf/1306.4361v1.pdf},
url = {https://arxiv.org/pdf/1306.4361v1.pdf},
}
@inproceedings{Anderson2014a,
@ -665,7 +665,7 @@
title = {``Good'' Worms and Human Rights},
volume = {38},
year = {2008},
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
}
@techreport{Bachrach2011a,
@ -673,7 +673,7 @@
title = {{\#h00t}: Censorship Resistant Microblogging},
institution = {Rice University and University of Texas at Arlington},
year = {2011},
url = {http://arxiv.org/pdf/1109.6874v1.pdf},
url = {https://arxiv.org/pdf/1109.6874v1.pdf},
}
@inproceedings{Benson2013a,
@ -709,7 +709,7 @@
publisher = {USENIX},
title = {Chipping Away at Censorship Firewalls with User-Generated Content},
year = {2010},
url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
url = {https://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
}
@inproceedings{Cao2009a,
@ -747,7 +747,7 @@
publisher = {Springer},
title = {Ignoring the {Great Firewall} of {China}},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
url = {https://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
}
@inproceedings{Clayton2006b,
@ -757,7 +757,7 @@
publisher = {Springer},
title = {Failures in a Hybrid Content Blocking System},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
url = {https://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
}
@inproceedings{Connolly2014a,
@ -803,7 +803,7 @@
booktitle = {Economics and Information Security},
title = {The Economics of Censorship Resistance},
year = {2004},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
url = {https://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
}
@techreport{Danezis2011a,
@ -846,7 +846,7 @@
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
url = {http://eprint.iacr.org/2012/494.pdf},
url = {https://eprint.iacr.org/2012/494.pdf},
}
@inproceedings{Ensafi2014a,
@ -855,7 +855,7 @@
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2014},
url = {http://arxiv.org/pdf/1312.5739.pdf},
url = {https://arxiv.org/pdf/1312.5739.pdf},
}
@inproceedings{Espinoza2011a,
@ -1148,7 +1148,7 @@
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
url = {https://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
}
@inproceedings{Morrison2014a,
@ -1156,7 +1156,7 @@
title = {Toward automatic censorship detection in microblogs},
booktitle = {Data Mining in Social Networks},
year = {2014},
url = {http://arxiv.org/pdf/1402.5310.pdf},
url = {https://arxiv.org/pdf/1402.5310.pdf},
}
@inproceedings{Nabi2013a,
@ -1184,7 +1184,7 @@
publisher = {IEEE},
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}},
year = {2010},
url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
url = {https://www.cs.unm.edu/~crandall/icdcs2010.pdf},
}
@inproceedings{Perng2005a,
@ -1231,7 +1231,7 @@
title = {Identity-Based Steganography and Its Applications to Censorship Resistance},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf},
url = {https://petsymposium.org/2013/papers/ruffing-censorship.pdf},
}
@inproceedings{Schuchard2012a,
@ -1403,7 +1403,7 @@
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2009},
url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
url = {https://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
}
@inproceedings{Weinberg2012a,
@ -1464,7 +1464,7 @@
title = {Regional Variation in {Chinese Internet} Filtering},
institution = {University of Oxford},
year = {2012},
url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
url = {https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
}
@inproceedings{Wustrow2011a,
@ -1473,7 +1473,7 @@
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2011},
url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
url = {https://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
}
@inproceedings{Wustrow2014a,
@ -1492,7 +1492,7 @@
publisher = {Springer},
year = {2011},
pages = {133--142},
url = {http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
url = {https://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
}
@inproceedings{Zhou2013a,
@ -1501,7 +1501,7 @@
booktitle = {Hot Topics in Privacy Enhancing Technologies},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf},
url = {https://petsymposium.org/2013/papers/zhou-censorship.pdf},
}
@inproceedings{Zhu2013a,