Allows the user to easily initiate an unblock request when an HTTPS site was denied by the adam:ONE® system.
You really need to disclose that you have a listener set up in the background via blockedhttpsdetector_background.js that literally catches ALL error URLs, and apparently ALL headers of sites I browse to your site of http://mytools.management/isblocked". Nowhere in the description or installation does it inform me as the user that my ENTIRE browsing history/activity is potentially being not only sent to your site (privacy) but then what obviously happens to my browsing performance if/when we all have to first send our traffic through your site?!? This alone takes it from a five-star extension to a one(zero)-star IMO and no way I'll continue to use it.
Before DNSThingy, I thought Cisco's Umbrella product was my best line of protection, except for the bypass of DNS lookups via HTTPS. DNSThingy's DTTS product is a singularly brilliant strategy to enforce protection at Layer 2 -- by assuring any outgoing connection is first qualified via a FQDN which allows one to evaluate the domain's reputation BEFORE allowing the connection!
Simple, straigforward, valuable. Indispensable for using with HTTP Request Blocker extension.
Thomas Rientjes
Sabconnect++ Developers
https://clearurls.xyz
https://privacy.com
bog
Raymond Hill (gorhill)
khloke
C.Vaes & T.Reinartz
badsgahhl
Moussekateer
https://sbussetti.github.io/deluge-siphon
https://xbrowsersync.org