Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

updated header

  • Loading branch information...
commit 4737a804299e1bd12ce385c71697f296fe4b5497 1 parent 508d9b5
Jonathan Mayer authored
5 jetpack/donottrack.js
@@ -4,10 +4,13 @@ Jonathan Mayer - jmayer@stanford.edu
4 4
5 5 A Jetpack module that adds a Do Not Track header to all web requests.
6 6
  7 +v0.02 - 1/30/11
  8 +Updated header.
  9 +
7 10 v0.01 - 11/14/10
8 11 */
9 12
10   -var DoNotTrackHeaderName = "X-Do-Not-Track";
  13 +var DoNotTrackHeaderName = "DNT";
11 14 var DoNotTrackHeaderValue = "1";
12 15
13 16 var {Cc, Ci} = require("chrome");
5 proxy/donottrack.py
@@ -4,6 +4,9 @@
4 4
5 5 A proof-of-concept web proxy that adds a Do Not Track header to all requests. Not intended for regular use.
6 6
  7 +v0.02 - 1/30/11
  8 +Updated header.
  9 +
7 10 v0.01 - 10/5/10
8 11 Sloppy HTTP 1.0 support. Apologies for any Python faux pas; this is my first foray into the language.
9 12 Acknowledgement: Architecture follows Suzuki Hisao's TinyHTTPProxy, http://www.okisoft.co.jp/esc/python/proxy/.
@@ -15,7 +18,7 @@
15 18 import socket
16 19 import select
17 20
18   -DoNotTrackHeaderName = "X-Do-Not-Track"
  21 +DoNotTrackHeaderName = "DNT"
19 22 DoNotTrackHeaderValue = "1"
20 23
21 24 AllowedHosts = ["127.0.0.1"]
5 xpcom/donottrack.js
@@ -4,12 +4,15 @@ Jonathan Mayer - jmayer@stanford.edu
4 4
5 5 An XPCOM component that adds a Do Not Track header to all web requests.
6 6
  7 +v0.02 - 1/30/11
  8 +Updated header.
  9 +
7 10 v0.01 - 10/26/10
8 11
9 12 Acknowledgement: Closely follows Mozilla's example XPCOM HTTP header modification component, https://developer.mozilla.org/en/Setting_HTTP_request_headers.
10 13 */
11 14
12   -var DoNotTrackHeaderName = "X-Do-Not-Track";
  15 +var DoNotTrackHeaderName = "DNT";
13 16 var DoNotTrackHeaderValue = "1";
14 17
15 18 function DNTHTTPListener() { }

0 comments on commit 4737a80

Please sign in to comment.
Something went wrong with that request. Please try again.