Compare the SneakyNote.com live Javascript with Github to insure it's not going to send your secret unencrypted or something fishy like that.
# Probably want to spoof all your headers to be just like a normal web browser | |
# so an attacker can't guess that you're trying to rat them out, but here's a | |
# start. | |
USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.130 Safari/537.36" | |
curl -A "$USER_AGENT" -sS https://sneakynote.com/send > send_live | |
curl -A "$USER_AGENT" -sS https://sneakynote.com/get > get_live | |
curl -A "$USER_AGENT" -sS https://raw.githubusercontent.com/brianhempel/sneakynote.com/master/public/send > send_github | |
curl -A "$USER_AGENT" -sS https://raw.githubusercontent.com/brianhempel/sneakynote.com/master/public/get > get_github | |
diff send_live send_github | |
diff get_live get_github | |
rm send_live get_live send_github get_github |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment