Pirate Party member: GDPR-compliant Whois will lead to 'doxxing and death lists'

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.
surveyjs.io
featured
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
  • whois

    Intelligent WHOIS client (by rfc1036)

  • Actually, it's not that many that have documentation available. /s

    But, given that Donuts Inc are the overlord of the internet in terms of (g)TLDs, there's not as many as some might think.

    The native whois client on most distributions is on github and contains a self-maintained list of whois servers in case you're curious [1].

    It also contains a list of all new gTLDs [2], which, for the most part are registered via Donuts Inc. in the end. It's kinda ridiculous that something like ".berlin" is owned, hosted, and distributed by an American company in Texas.

    The ICANNWiki also has some nice side-facts about registrars if you're more curious about their organizational structure [3].

    [1] https://github.com/rfc1036/whois/blob/next/tld_serv_list

    [2] https://github.com/rfc1036/whois/blob/next/new_gtlds_list

    [3] https://icannwiki.org/Donuts

  • stealth

    :rocket: Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy

  • I'm building a peer to peer Browser network that relies on trust ratios/factor in order to find out the seed/leech ratio of sharing content, producing content etc.

    The problem I'm currently trying to solve is that I had the idea to have a vendor profile that contains the necessary information for IP ranges (ASN, organization, region, country, ISP/NAT etc) so that the discovery service for that doesn't have to do this.

    It's like the basic idea of an offline "map of the internet" that should be an approximation of who does what in which amount of data (e.g. data center IPs aren't trustworthy or same ISP-NATed IP could be censored the same when it comes to blocked websites etc).

    At this point it's a big experiment and I'm not sure whether I'm fundamentally wrong about this as I don't have any data to back it up.

    If you're curious, it's part of the Stealth Browser I'm building [1] and [2]

    [1] https://github.com/tholian-network/stealth

    [2] https://github.com/tholian-network/stealth-vendor

  • SurveyJS

    Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App. With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.

    SurveyJS logo
  • stealth-vendor

    Discontinued :package: Stealth Vendor Profile dependencies (containing IP, ASN, whois, CNAME and PTR data)

  • I'm building a peer to peer Browser network that relies on trust ratios/factor in order to find out the seed/leech ratio of sharing content, producing content etc.

    The problem I'm currently trying to solve is that I had the idea to have a vendor profile that contains the necessary information for IP ranges (ASN, organization, region, country, ISP/NAT etc) so that the discovery service for that doesn't have to do this.

    It's like the basic idea of an offline "map of the internet" that should be an approximation of who does what in which amount of data (e.g. data center IPs aren't trustworthy or same ISP-NATed IP could be censored the same when it comes to blocked websites etc).

    At this point it's a big experiment and I'm not sure whether I'm fundamentally wrong about this as I don't have any data to back it up.

    If you're curious, it's part of the Stealth Browser I'm building [1] and [2]

    [1] https://github.com/tholian-network/stealth

    [2] https://github.com/tholian-network/stealth-vendor

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • The FBI Identified a Tor User

    3 projects | news.ycombinator.com | 17 Jan 2023
  • There are no Internet Browsers that cannot be tracked, or are there?

    3 projects | /r/hacking | 17 Sep 2022
  • Ask HN: How you would redesign a web browser?

    1 project | news.ycombinator.com | 14 Feb 2022
  • TholianĀ® Stealth - Secure, Peer-to-Peer, Private and Automatable Web Browser/Scraper/Proxy for the Web of Truth and Knowledge. Goals: increased Privacy, increased Automation, adaptive Semantic Understanding. Web Scraper + Web Service + Web Proxy

    1 project | /r/AltTech | 21 Oct 2021
  • Request for Feedback on Network Concept

    1 project | /r/hacking | 1 Sep 2021