-
-
Notifications
You must be signed in to change notification settings - Fork 179
Description
Considering the issues described at #151, this ticket is to propose a different approach to blocking "future onion services" based on an existing "blocking pattern" in the attempt to fight cryptolockers.
But what if, for each blocked site,there would be a dump by passing it to some hashing designed to work with "similarity matching" and then to be able to have an auto-blocks for web-pages that behave to be similar more than 90% to a previously blocked page?
Without looking into the context of the content, but only of similarity of the web page fingerprint/pattern of an already blocked web page, we could be able to block new web pages.
It does require an algorithm implemented by some existing ready-made library that gives out the similarity of a website, compared to another website.
If this exists, we would be able, once blocking one crypto-locker, to block all the cryptolocker landing page of the same campaign, without entering into an arm-race of regexp'ing stuff, they change something, we regexp other stuff, etc
I don't know how complex it would be, but i think it's neat!
--- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/29594930-blocking-onion-services-based-on-similarity-matching-on-already-blocked-ones?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github).