mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-23 22:51:15 -04:00
Run all URLs through HTTPS Everywhere.
I started with https://github.com/EFForg/https-everywhere commit 2f387958564289e452324c63bc9d60617f432241, then added this pull request (fixes rewriter.js): https://github.com/EFForg/https-everywhere/pull/12487 then further applied this tiny patch to make rewriter.js process a single file, rather than a directory: for (var i = 2; i < process.argv.length; i++) { - processDir(process.argv[i]); + processFile(process.argv[i]); } I then ran these commands (cribbed from a comment in rewriter.js): https-everywhere$ ./makecrx.sh https-everywhere$ cd rewriter https-everywhere$ npm install https-everywhere$ node rewriter.js ~/censorbib/references.bib Signed-off-by: Philipp Winter <phw@nymity.ch>
This commit is contained in:
parent
7c97c8395c
commit
242e038793
1 changed files with 23 additions and 23 deletions
|
@ -106,7 +106,7 @@
|
|||
booktitle = {European Symposium on Security \& Privacy},
|
||||
publisher = {IEEE},
|
||||
year = {2017},
|
||||
url = {http://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
|
||||
url = {https://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
|
||||
}
|
||||
|
||||
@techreport{Wolfgarten2006a,
|
||||
|
@ -151,7 +151,7 @@
|
|||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2016},
|
||||
url = {http://dl.acm.org/authorize?N25517},
|
||||
url = {https://dl.acm.org/authorize?N25517},
|
||||
}
|
||||
|
||||
@inproceedings{Bocovich2016a,
|
||||
|
@ -447,7 +447,7 @@
|
|||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2011},
|
||||
url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
|
||||
url = {https://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Ververis2015a,
|
||||
|
@ -598,7 +598,7 @@
|
|||
publisher = {CTU Publishing House},
|
||||
title = {The {Eternity} Service},
|
||||
year = {1996},
|
||||
url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
|
||||
url = {https://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
|
||||
}
|
||||
|
||||
@techreport{Anderson2012a,
|
||||
|
@ -606,7 +606,7 @@
|
|||
title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network},
|
||||
institution = {},
|
||||
year = {2012},
|
||||
url = {http://arxiv.org/pdf/1209.6398v1},
|
||||
url = {https://arxiv.org/pdf/1209.6398v1},
|
||||
}
|
||||
|
||||
@techreport{Anderson2013a,
|
||||
|
@ -614,7 +614,7 @@
|
|||
title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}},
|
||||
institution = {University of Pennsylvania},
|
||||
year = {2013},
|
||||
url = {http://arxiv.org/pdf/1306.4361v1.pdf},
|
||||
url = {https://arxiv.org/pdf/1306.4361v1.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Anderson2014a,
|
||||
|
@ -665,7 +665,7 @@
|
|||
title = {``Good'' Worms and Human Rights},
|
||||
volume = {38},
|
||||
year = {2008},
|
||||
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
|
||||
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
|
||||
}
|
||||
|
||||
@techreport{Bachrach2011a,
|
||||
|
@ -673,7 +673,7 @@
|
|||
title = {{\#h00t}: Censorship Resistant Microblogging},
|
||||
institution = {Rice University and University of Texas at Arlington},
|
||||
year = {2011},
|
||||
url = {http://arxiv.org/pdf/1109.6874v1.pdf},
|
||||
url = {https://arxiv.org/pdf/1109.6874v1.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Benson2013a,
|
||||
|
@ -709,7 +709,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {Chipping Away at Censorship Firewalls with User-Generated Content},
|
||||
year = {2010},
|
||||
url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
|
||||
url = {https://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Cao2009a,
|
||||
|
@ -747,7 +747,7 @@
|
|||
publisher = {Springer},
|
||||
title = {Ignoring the {Great Firewall} of {China}},
|
||||
year = {2006},
|
||||
url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
|
||||
url = {https://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Clayton2006b,
|
||||
|
@ -757,7 +757,7 @@
|
|||
publisher = {Springer},
|
||||
title = {Failures in a Hybrid Content Blocking System},
|
||||
year = {2006},
|
||||
url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
|
||||
url = {https://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Connolly2014a,
|
||||
|
@ -803,7 +803,7 @@
|
|||
booktitle = {Economics and Information Security},
|
||||
title = {The Economics of Censorship Resistance},
|
||||
year = {2004},
|
||||
url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
|
||||
url = {https://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
|
||||
}
|
||||
|
||||
@techreport{Danezis2011a,
|
||||
|
@ -846,7 +846,7 @@
|
|||
booktitle = {Computer and Communications Security},
|
||||
year = {2013},
|
||||
publisher = {ACM},
|
||||
url = {http://eprint.iacr.org/2012/494.pdf},
|
||||
url = {https://eprint.iacr.org/2012/494.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Ensafi2014a,
|
||||
|
@ -855,7 +855,7 @@
|
|||
booktitle = {Passive and Active Measurement Conference},
|
||||
publisher = {Springer},
|
||||
year = {2014},
|
||||
url = {http://arxiv.org/pdf/1312.5739.pdf},
|
||||
url = {https://arxiv.org/pdf/1312.5739.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Espinoza2011a,
|
||||
|
@ -1148,7 +1148,7 @@
|
|||
booktitle = {Computer and Communications Security},
|
||||
year = {2012},
|
||||
publisher = {ACM},
|
||||
url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
|
||||
url = {https://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Morrison2014a,
|
||||
|
@ -1156,7 +1156,7 @@
|
|||
title = {Toward automatic censorship detection in microblogs},
|
||||
booktitle = {Data Mining in Social Networks},
|
||||
year = {2014},
|
||||
url = {http://arxiv.org/pdf/1402.5310.pdf},
|
||||
url = {https://arxiv.org/pdf/1402.5310.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Nabi2013a,
|
||||
|
@ -1184,7 +1184,7 @@
|
|||
publisher = {IEEE},
|
||||
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}},
|
||||
year = {2010},
|
||||
url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
|
||||
url = {https://www.cs.unm.edu/~crandall/icdcs2010.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Perng2005a,
|
||||
|
@ -1231,7 +1231,7 @@
|
|||
title = {Identity-Based Steganography and Its Applications to Censorship Resistance},
|
||||
publisher = {Springer},
|
||||
year = {2013},
|
||||
url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf},
|
||||
url = {https://petsymposium.org/2013/papers/ruffing-censorship.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Schuchard2012a,
|
||||
|
@ -1403,7 +1403,7 @@
|
|||
booktitle = {Network and Distributed System Security},
|
||||
publisher = {The Internet Society},
|
||||
year = {2009},
|
||||
url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
|
||||
url = {https://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Weinberg2012a,
|
||||
|
@ -1464,7 +1464,7 @@
|
|||
title = {Regional Variation in {Chinese Internet} Filtering},
|
||||
institution = {University of Oxford},
|
||||
year = {2012},
|
||||
url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
|
||||
url = {https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
|
||||
}
|
||||
|
||||
@inproceedings{Wustrow2011a,
|
||||
|
@ -1473,7 +1473,7 @@
|
|||
booktitle = {USENIX Security Symposium},
|
||||
publisher = {USENIX},
|
||||
year = {2011},
|
||||
url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
|
||||
url = {https://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Wustrow2014a,
|
||||
|
@ -1492,7 +1492,7 @@
|
|||
publisher = {Springer},
|
||||
year = {2011},
|
||||
pages = {133--142},
|
||||
url = {http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
|
||||
url = {https://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Zhou2013a,
|
||||
|
@ -1501,7 +1501,7 @@
|
|||
booktitle = {Hot Topics in Privacy Enhancing Technologies},
|
||||
publisher = {Springer},
|
||||
year = {2013},
|
||||
url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf},
|
||||
url = {https://petsymposium.org/2013/papers/zhou-censorship.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Zhu2013a,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue