SDF censors pro-privacy project

This commit is contained in:
humanacollaborator 2021-06-22 21:41:56 -04:00
parent ab338fcda9
commit 2221e7ad31
2 changed files with 2 additions and 2 deletions

View File

@ -15,7 +15,6 @@ The following forges have no significant ethical issues:
[dev.sum7.eu](https://dev.sum7.eu)|✅|Gitea 1.14.0[⚠][gitea-bug]|n|n|n|n|| [dev.sum7.eu](https://dev.sum7.eu)|✅|Gitea 1.14.0[⚠][gitea-bug]|n|n|n|n||
[git.nixnet.services](https://git.nixnet.services)|❌|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n|formerly git.nixnet.xyz| [git.nixnet.services](https://git.nixnet.services)|❌|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n|formerly git.nixnet.xyz|
[git.safemobile.org](https://git.safemobile.org)|✅|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n|| [git.safemobile.org](https://git.safemobile.org)|✅|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n||
[git.sdf.org](https://git.sdf.org)|✅|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n|git.sdf.org is tar-pitting many Tor IPs in defense of attack & it's unclear if this is a temporary measure; SSH over Tor broken but HTTPS over Tor works; some UTF-8 emoticons apparently broke in upgrade from 1.13.1 to 1.14.1 (this table shows boxes now)|
[git.disroot.org](https://git.disroot.org)|✅|Gitea 1.14.2[⚠][gitea-bug]|n|n|n|n|SSH over Tor works; based in NL| [git.disroot.org](https://git.disroot.org)|✅|Gitea 1.14.2[⚠][gitea-bug]|n|n|n|n|SSH over Tor works; based in NL|
[git.nogafam.es](https://git.nogafam.es)([onion](http://git.hsdtecd4h2b5z732pvkg2yw3746epap4qusgvjjze6nhmfcdpz2suiad.onion/))|✅|Gitea 1.15.0[⚠][gitea-bug]|n|n|n|n|[SSH disabled](https://git.nogafam.es/deCloudflare/deCloudflare/issues/18#issuecomment-75); large repos are [git-inaccessible over Tor](https://git.nogafam.es/deCloudflare/deCloudflare/issues/18#issuecomment-48)| [git.nogafam.es](https://git.nogafam.es)([onion](http://git.hsdtecd4h2b5z732pvkg2yw3746epap4qusgvjjze6nhmfcdpz2suiad.onion/))|✅|Gitea 1.15.0[⚠][gitea-bug]|n|n|n|n|[SSH disabled](https://git.nogafam.es/deCloudflare/deCloudflare/issues/18#issuecomment-75); large repos are [git-inaccessible over Tor](https://git.nogafam.es/deCloudflare/deCloudflare/issues/18#issuecomment-48)|
[try.gitea.io](https://try.gitea.io)|✅|Gitea 1.15.0[⚠][gitea-bug]|n|n|n|n|Intended only for Gitea experimentation; no expectation of future availability| [try.gitea.io](https://try.gitea.io)|✅|Gitea 1.15.0[⚠][gitea-bug]|n|n|n|n|Intended only for Gitea experimentation; no expectation of future availability|
@ -46,6 +45,7 @@ These forges are not as seriously flawed as the blacklisted ones, but they shoul
[gitea.it](https://gitea.it)|✅|Gitea 1.12.4|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch)| [gitea.it](https://gitea.it)|✅|Gitea 1.12.4|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch)|
[git.kiwifarms.net](https://git.kiwifarms.net)|✅|Gitea 1.13.1|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch)| [git.kiwifarms.net](https://git.kiwifarms.net)|✅|Gitea 1.13.1|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch)|
[codeberg.org](https://codeberg.org)|✅|Gitea 1.14 customized[⚠][gitea-bug]|n|n|n|n|Based in Germany; [censored an anti-Cloudflare project](codeberg.md) in a reckless and destructive manner; functions without any JavaScript and the JavaScript that exists is all 1st-party ([ref](https://github.com/privacytoolsIO/privacytools.io/issues/843#issuecomment-483830547)); devs make [foolish decisions](https://codeberg.org/Codeberg/Community/issues/444) (improving performance by breaking some browsers, when the performance improvement only affects those they broke.)| [codeberg.org](https://codeberg.org)|✅|Gitea 1.14 customized[⚠][gitea-bug]|n|n|n|n|Based in Germany; [censored an anti-Cloudflare project](codeberg.md) in a reckless and destructive manner; functions without any JavaScript and the JavaScript that exists is all 1st-party ([ref](https://github.com/privacytoolsIO/privacytools.io/issues/843#issuecomment-483830547)); devs make [foolish decisions](https://codeberg.org/Codeberg/Community/issues/444) (improving performance by breaking some browsers, when the performance improvement only affects those they broke.)|
[git.sdf.org](https://git.sdf.org)|✅|Gitea 1.14.1[⚠][gitea-bug]|n|n|n|n|git.sdf.org [censored](https://git.sdf.org/deCloudflare/deCloudflare) the deCloudflare project without warning, reason, or recourse. So git.sdf.org apparently not welcoming of projects driven by pro-privacy, netneutrality, or anti-tech-giant types of activism. SDF is also tar-pitting many Tor IPs in defense of attack & it's unclear if this is a temporary measure; SSH over Tor broken but HTTPS over Tor works; some UTF-8 emoticons apparently broke in upgrade from 1.13.1 to 1.14.1.|
[git.shivering-isles.com](https://git.shivering-isles.com)|❌|Gitlab (CE)|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch); Registration is open but broken-- requires 2FA using a device that can QR-scan, and the email verification link is DoA: ![](images/shivering-isles_broken_reg.png) That stale link error triggers even when accessed immediately.| [git.shivering-isles.com](https://git.shivering-isles.com)|❌|Gitlab (CE)|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch); Registration is open but broken-- requires 2FA using a device that can QR-scan, and the email verification link is DoA: ![](images/shivering-isles_broken_reg.png) That stale link error triggers even when accessed immediately.|
[git.hardenedbsd.org](https://git.hardenedbsd.org)|✅|Gitlab (EE)|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch); possibly restricted to BSD efforts| [git.hardenedbsd.org](https://git.hardenedbsd.org)|✅|Gitlab (EE)|n|n|n|n|**Cloudflare NS server** (they can route all traffic via CF at the flip of a switch); possibly restricted to BSD efforts|
[source.puri.sm](https://source.puri.sm)|✅|Gitlab (EE)|n|n|n|n|open registration but activity is [restricted](https://social.librem.one/@kyle/106030358887310621) to puri.sm efforts; accounts are subject to spontaneous unjustified bans (apparent censorship): ![](images/purism_ban.png); no CAPTCHA (confirmed March 2021); is the JavaScript non-free with the enterprize edition?| [source.puri.sm](https://source.puri.sm)|✅|Gitlab (EE)|n|n|n|n|open registration but activity is [restricted](https://social.librem.one/@kyle/106030358887310621) to puri.sm efforts; accounts are subject to spontaneous unjustified bans (apparent censorship): ![](images/purism_ban.png); no CAPTCHA (confirmed March 2021); is the JavaScript non-free with the enterprize edition?|

View File

@ -46,7 +46,7 @@ insert into forgesTbl (url_clrnet, url_onion, software, notes) values ('https://
insert into forgesTbl (url_clrnet, software, notes) values ('https://git.slashdev.space','Gitea 1.13.6','SSH port: 22; SSH over Tor broken (try HTTPS over Tor)'); insert into forgesTbl (url_clrnet, software, notes) values ('https://git.slashdev.space','Gitea 1.13.6','SSH port: 22; SSH over Tor broken (try HTTPS over Tor)');
insert into forgesTbl (url_clrnet, software, notes) values ('https://git.disroot.org','Gitea 1.14.2','SSH over Tor works; based in NL'); insert into forgesTbl (url_clrnet, software, notes) values ('https://git.disroot.org','Gitea 1.14.2','SSH over Tor works; based in NL');
insert into forgesTbl (url_clrnet, software, openpubreg, cflogin, notes) values ('https://libregit.org','Gitea',0,1,'reg by invite only'); insert into forgesTbl (url_clrnet, software, openpubreg, cflogin, notes) values ('https://libregit.org','Gitea',0,1,'reg by invite only');
insert into forgesTbl (url_clrnet, software, notes) values ('https://git.sdf.org','Gitea 1.14.1','git.sdf.org is tar-pitting many Tor IPs in defense of attack & it''s unclear if this is a temporary measure; SSH over Tor broken but HTTPS over Tor works; some UTF-8 emoticons apparently broke in upgrade from 1.13.1 to 1.14.1 (this table shows boxes now)'); insert into forgesTbl (url_clrnet, software, notes) values ('https://git.sdf.org','Gitea 1.14.1','git.sdf.org [censored](https://git.sdf.org/deCloudflare/deCloudflare) the deCloudflare project without warning, reason, or recourse. So git.sdf.org apparently not welcoming of projects driven by pro-privacy, netneutrality, or anti-tech-giant types of activism. SDF is also tar-pitting many Tor IPs in defense of attack & it''s unclear if this is a temporary measure; SSH over Tor broken but HTTPS over Tor works; some UTF-8 emoticons apparently broke in upgrade from 1.13.1 to 1.14.1.');
insert into forgesTbl (url_clrnet, software, cfns) values ('https://gitea.it','Gitea 1.12.4',1); insert into forgesTbl (url_clrnet, software, cfns) values ('https://gitea.it','Gitea 1.12.4',1);
insert into forgesTbl (url_clrnet, software, notes) values ('https://de.edumat.io','Gitea 1.05.2','no SSH'); insert into forgesTbl (url_clrnet, software, notes) values ('https://de.edumat.io','Gitea 1.05.2','no SSH');
insert into forgesTbl (url_clrnet, software, cfns) values ('https://git.kiwifarms.net','Gitea 1.13.1',1); insert into forgesTbl (url_clrnet, software, cfns) values ('https://git.kiwifarms.net','Gitea 1.13.1',1);