
Hi, Just notices this old email when I did a search for other emails.... On 4/5/17 10:48 am, Trent W. Buck wrote:
Andrew McGlashan via luv-talk wrote:
On 03/05/17 23:59, Douglas Ray via luv-talk wrote:
Firmware remote vulnerability in Intel business products
Can I preview a bitlink before clicking on it? https://support.bitly.com/hc/en-us/articles/230650447-Can-I-preview-a-bitlin...
Yeah, but using bit.ly has other problems -- not least of which is they track the s*** out of them...
$ curl -so/dev/null -Iw'%{redirect_url}\n' http://bit.ly/2qyHCQn https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution...
Then browse to that link directly, which will bypass (some) of the tracking.
Not sure it stops the tracking because you've got to get the redirect from it....
If this is a common task for you, you can wrap it into a shell function or whatever.
#!/bin/sh -e xdg-open "$(curl -so/dev/null -Iw'%{redirect_url}\n' "$1")"
Just add a "+" to the end of bit.ly links and you can see the reporting of link usage and see the actual link it points to as well. In this case, a tiny 69 clicks. https://bitly.com/2qyHCQn+ If you don't want any tracking bit.ly -- then don't use them at all. The attached script /might/ be useful for some. NB: Sometimes there are multiple redirects.... - and quite often there is junk at the end of a URL. Oh and my script has an added advantage of converting a couple of URLs to Tor network address (.onion) to keep off exit nodes where possible; there could easily be more .onion addresses added though. My script shows transition of links and defaults to having clean links to use with a chosen browser from a list of browsers. If a determined link is not useful, one of the transitional ones (with what may have been junk), may work. Output from a sample run is attached as well. Cheers AndrewM