summaryrefslogtreecommitdiff
path: root/doc/www.anonet2.org/public_pod/index.pod
diff options
context:
space:
mode:
Diffstat (limited to 'doc/www.anonet2.org/public_pod/index.pod')
-rw-r--r--doc/www.anonet2.org/public_pod/index.pod16
1 files changed, 12 insertions, 4 deletions
diff --git a/doc/www.anonet2.org/public_pod/index.pod b/doc/www.anonet2.org/public_pod/index.pod
index e6e3978..c9247df 100644
--- a/doc/www.anonet2.org/public_pod/index.pod
+++ b/doc/www.anonet2.org/public_pod/index.pod
@@ -269,6 +269,14 @@ Webchat (looking to relay to IRC, L<http://www.sevilnatas.ano/chat/>)
=item *
+L<WikiLeaks Mirror|http://wikileaks.ucis.ano/> (The real WikiLeaks may be down, but not our mirror!)
+
+=item *
+
+L<Some Random Wiki|http://www.somerandomwiki.ano/>
+
+=item *
+
Pastebin (without time-zone leaks, L<http://www.sevilnatas.ano/pastebin/>)
=item *
@@ -281,7 +289,7 @@ Live WorldCup Stream (offline until next year)
=item *
-DNS (Recursive: 1.0.27.38; TLD: 1.0.27.37; Root: 1.0.27.39)
+DNS (Recursive: 1.0.27.38 & 1.3.3.64; TLD: 1.0.27.37 & 1.3.3.66; Root: 1.0.27.39 & 1.3.3.65)
=item *
@@ -305,7 +313,7 @@ git (including a decentralized "wiki" replacement) (L<SRN|git://git1.somerandomn
=item *
-outbound HTTP proxies to the public Internet (L<http://a.privoxy.somerandomnick.ano:8118/> and L<http://b.privoxy.somerandomnick.ano:8118/>)
+outbound HTTP proxies to the public Internet (L<http://a.privoxy.somerandomnick.ano:8118/>, L<http://b.privoxy.somerandomnick.ano:8118/>, L<http://a.polipo.somerandomnick.ano:8118/> and L<http://a.polipo.somerandomnick.ano:8118/>)
=item *
@@ -382,8 +390,8 @@ everyone else be damned.)
=item Outbound HTTP Proxies
-SRN runs two right now and ryuk runs one, but that means between the two
-of them they can snoop on all HTTP traffic from AnoNet2 to IcannNet.
+SRN runs three right now and ryuk runs one, but that means between the
+two of them they can snoop on all HTTP traffic from AnoNet2 to IcannNet.
Having more proxies gives you an alternative to blindly trusting SRN
and ryuk not to sell your click-through data to Google, invert the order
of search results to your queries, and inject malicious JavaScript into