Method:
- Take the Alexa “Top 1 million” and extract the top 1000 websites
- Fetch their homepages as ‘
www.site.domain‘ over HTTP usingcurl
From this list, attached below are the blocked websites; mostly porn, but with some surprises. Notably all blogspot.com blogs are blocked – including the Google security blogs – but not wordpress.com, blogger.com, livejournal.com …
- 2ch.net
- 4tube.com
- 51.la
- 888.com
- addthis.com
- adult-empire.com
- adultadworld.com
- adultfriendfinder.com
- alphaporno.com
- amazon.co.jp
- anonym.to
- baidu.com
- beeg.com
- bet365.com
- betfair.com
- bild.de
- blogfa.com
- blogspot.com
- cam4.com
- cnzz.com
- dmm.co.jp
- drtuber.com
- empflix.com
- ero-advertising.com
- extremetube.com
- gamefaqs.com
- h2porn.com
- hardsextube.com
- hidemyass.com
- imagebam.com
- imesh.com
- in.com
- isohunt.com
- istockphoto.com
- keezmovies.com
- largeporntube.com
- linkbucks.com
- livejasmin.com
- match.com
- metacafe.com
- mihanblog.com
- motherless.com
- movie2k.to
- myfreecams.com
- nate.com
- okcupid.com
- pch.com
- pclady.com.cn
- perfectgirls.net
- pogo.com
- porn.com
- pornerbros.com
- pornhub.com
- pornhublive.com
- porntube.com
- rakuten.co.jp
- rapidshare.com
- redtube.com
- seznam.cz
- slutload.com
- spankwire.com
- speedbit.com
- squidoo.com
- streamate.com
- stumbleupon.com
- sunporno.com
- tinypic.com
- tmz.com
- tnaflix.com
- trafficholder.com
- tube8.com
- tubegalore.com
- urbandictionary.com
- video-one.com
- williamhill.com
- xhamster.com
- xnxx.com
- xtube.com
- xvideos.com
- y8.com
- ya.ru
- youjizz.com
- youporn.com
- yourlust.com
- zedo.com
update: removed the links, dan benton is sorta right, and moreover some people might get upset by dns preloading…
Comments
14 responses to “Websites that are blocked by O2 at #BarCampBerkshire”
Interesting that blogspot and baidu are on there.
And at least three betting sites.
The Sun is accessible; Bild is not?
“Play Free Games at Y8.com” – ahhhhh
…Aaaaaaaand you can use Google Translate to drill through the filter.
does block reddit.com/r/nsfw but not reddit.com itself…
Mmm – as you say, there are some surprises. I wonder what’s considered “iffy” about Amazon’s Japanese site?
I’m not on O2 so I can’t investigate by trying to access one of these sites from an O2 link, but is it definitely O2 that’s doing the blocking, rather than some other organisation in the chain? (I’ve just looked, and amazon.co.jp works fine from Vodafone…) Does the blocking look like blackhole routing, or is it just at a DNS level?
Apparently Amazon.JP has a reputation for putting porn on the page somewhat unabashedly.
An interesting thing about O2 Web blocking (at their corporate HQ, Dave) is that HideMyAss and Anonym.to are blocked, but Tor is not.
Am wondering whether Tor’s reputation as a “good guy” is protecting them somewhat, as it is immensely embarrassing for a carrier to be discovered to be blocking Tor, as opposed to a commercial service.
Do you really want hyperlinks to all hose sites on your blog? I really don’t care but I’d hate to see even less people find your posts due to some crappy web filtering!
I’ll take the hit; if there’s an issue I would rather attack the web filtering companies for doing it wrong.
Hi Alec,
I’ve been testing mobile network blocking for ORG over the past few weeks as part of the work on blocked.org.uk.
I ran your list through a test script on O2’s mobile network and almost all of the non-porn sites came through ok.
What I did see was a lot of http 301 and 302 redirects. Did you use the -L flag with curl to follow redirects?
Hi Jake,
No, I did a straight pull of every URL and saved the result; of the 80-odd blocks I sampled perhaps 20 in Chrome and saw the same resulting block page, so I believe my results are realistic.
This was O2’s Wifi at O2’s headquarters, to I doubt it will be the same as the mobile blocking.
Is there an issue with my methodology? Shall we document one to act as a future metric?
Hi Alec,
I think my reply got lost so I’ll try again.
Yes, there must be different filters in place for o2’s wifi and mobile services.
My method is very similar to yours;
curl -L or Python urllib2.urlopen.
Then grep the result for the known values of o2’s blocked pages;
'^(https://bango.net/).*''^http://wap.o2.co.uk/(18plusaccess).*'Thanks,
Jake