BugMeNot

Last updated
BugMeNot
BugMeNot homepage screenshot.png
The homepage of the website in February 2021
Type of site
Online database
Available inEnglish
Created byGuy King
URL bugmenot.com OOjs UI icon edit-ltr-progressive.svg
RegistrationNone
LaunchedAugust 2003;21 years ago (2003-08)

BugMeNot is an Internet service that provides usernames and passwords allowing Internet users to bypass mandatory free registration on websites. It was started in August 2003 by an anonymous person, later revealed to be Guy King, [1] and allowed Internet users to access websites that have registration walls (for instance, that of The New York Times ) with the requirement of compulsory registration. This came in response to the increasing number of websites that request such registration, which many Internet users find to be an annoyance and a potential source of email spam. [2]

Contents

Use of the service

BugMeNot allows users of their service to add new accounts for sites with free registration. It also encourages users to use disposable email address services to create such accounts. However, it does not allow them to add accounts for paid websites, as this could potentially lead to credit card fraud. [3] BugMeNot also claims to remove accounts for any website, requesting that they do not provide accounts for non-registered users.

To help make access to their service easier, BugMeNot hosts a bookmarklet that can be used with any browser to automatically find a usable account from their service. They also host extensions for the web browsers Mozilla Firefox (but not on Firefox quantum yet), Internet Explorer, and Google Chrome (the extensions were created by Eric Hamiter with Dmytri Kleiner and Dean Wilson, respectively).[ citation needed ] There are also implementations in the form of a BugMeNot Opera widget, or UserJS scripts along with buttons, which makes it fully browser-integrated. An Android application is also available. [4]

Opting out

The original BugMeNot website Original BugMeNot homepage.png
The original BugMeNot website

BugMeNot provides an option for site owners to block their site from the BugMeNot database, if they match one or more of the following criteria: [5]

No option is provided for users to request removing a block if a site ceases to meet the blocking criteria or has never met them in the first place.

Site blocking can be circumvented by BugMeNot users by publishing usernames and passwords under a similar, but different, domain name to which they apply. For example, the owners of the domain abc.def.com might request a block to be put in place, but this will not prevent users uploading access information under the name of def.abc.com. Since one domain owner cannot demand that another domain be blocked, the information remains and is accessibly provided that BugMeNot users tacitly agree that def.abc.com in fact refers to abc.def.com.[ original research? ] For example, Wikipedia logins are in the database under wikipedia.net because wikipedia.com and wikipedia.org have been banned under the first criterion. [6]

Temporary shutdown and return

Nearly a year after it was created, BugMeNot was shut down temporarily by its service provider (at that time), HostGator. The site's creator claimed BugMeNot's host was pressured by websites to shut them down, though Hostgator claimed that the BugMeNot site was repeatedly crashing their servers. [7]

The BugMeNot domain was transferred briefly to another hosting company, dissidenthosting.com, but before the site was set up, it began to redirect visitors to web pages belonging to racist groups, without the knowledge or consent of the site's owner. BugMeNot moved again, to NearlyFreeSpeech.NET. BugMeNot's move to this provider, which also hosts a number of highly controversial sites, prompted BugMeNot's creator to say, "Personally, I don't care if I'm sharing a server with neo-Nazis. I might not agree with what they have to say, but the whole thing about freedom of speech is that people are free to speak." [8]

Shortly after BugMeNot returned, reports surfaced that some news sites had begun to attempt to block accounts posted on BugMeNot, though the extent and effectiveness of such efforts, as well as compliance with BugMeNot's Terms of Use, [9] are not known.

RetailMeNot

The operators of BugMeNot expanded the "MeNot" network in October 2006 with the addition of RetailMeNot  – a service for finding and sharing online coupon codes. Users can add coupons they have found through any method, as well as a description of the coupon and an expiration date. Users can also scan in printed coupons and upload them for others to print.

Related Research Articles

<span class="mw-page-title-main">Web browser</span> Software used to access websites

A web browser is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on a range of devices, including desktops, laptops, tablets, and smartphones. By 2020, an estimated 4.9 billion people had used a browser. The most-used browser is Google Chrome, with a 67% global market share on all devices, followed by Safari with 18%.

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

<span class="mw-page-title-main">Basic access authentication</span> Access control method for the HTTP network communication protocol

In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent to provide a user name and password when making a request. In basic HTTP authentication, a request contains a header field in the form of Authorization: Basic <credentials>, where <credentials> is the Base64 encoding of ID and password joined by a single colon :.

<span class="mw-page-title-main">Netscape Browser</span> Web browser

Netscape Browser is the eighth major release of the Netscape series of web browsers, now all discontinued. It was published by AOL, but developed by Mercurial Communications, and originally released for Windows on May 19, 2005.

<span class="mw-page-title-main">Digest access authentication</span> Method of negotiating credentials between web server and browser

Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser. This can be used to confirm the identity of a user before sending sensitive information, such as online banking transaction history. It applies a hash function to the username and password before sending them over the network. In contrast, basic access authentication uses the easily reversible Base64 encoding instead of hashing, making it non-secure unless used in conjunction with TLS.

Link prefetching allows web browsers to pre-load resources. This speeds up both the loading and rendering of web pages. Prefetching was first introduced in HTML5.

<span class="mw-page-title-main">Adblock Plus</span> Content-filtering and ad blocking browser extension

Adblock Plus (ABP) is a free and open-source browser extension for content-filtering and ad blocking. It is developed by Eyeo GmbH, a German software company. The extension has been released for Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge, Opera, Safari, Yandex Browser, and Android.

<span class="mw-page-title-main">Mozilla Application Suite</span> Discontinued Internet suite

The Mozilla Application Suite is a discontinued cross-platform integrated Internet suite. Its development was initiated by Netscape Communications Corporation, before their acquisition by AOL. It was based on the source code of Netscape Communicator. The development was spearheaded by the Mozilla Organization from 1998 to 2003, and by the Mozilla Foundation from 2003 to 2006.

NoScript is a free and open-source extension for Firefox- and Chromium-based web browsers, written and maintained by Giorgio Maone, a software developer and member of the Mozilla Security Group.

In HTTP networking, typically on the World Wide Web, referer spoofing sends incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page previously visited by the user.

<span class="mw-page-title-main">HTTP cookie</span> Small pieces of data stored by a web browser while on a website

HTTP cookies are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session.

<span class="mw-page-title-main">Blacklist (computing)</span> Criteria to control computer access

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements, except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, allowlist, or passlist, in which only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked until an additional step is performed.

The Public Suffix List (PSL) is a community-maintained list of rules that describe the internet domain name suffixes under which independent organisations can register their own sites. Entries on the list are referred to as effective top-level domains (eTLDs), and contain commonly used suffixes like com, net and co.uk, as well as private suffixes like appspot.com and github.io.

<span class="mw-page-title-main">Clickjacking</span> Malicious technique of tricking a Web user

Clickjacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages.

Firefox Sync, originally branded Mozilla Weave, is a browser synchronization feature for Firefox web browsers. It allows users to partially synchronize bookmarks, browsing history, preferences, passwords, filled forms, add-ons, and the last 25 opened tabs across multiple computers. The feature is now included in Firefox and is being implemented in Thunderbird.

HTTP Strict Transport Security (HSTS) is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. It allows web servers to declare that web browsers should automatically interact with it using only HTTPS connections, which provide Transport Layer Security (TLS/SSL), unlike the insecure HTTP used alone. HSTS is an IETF standards track protocol and is specified in RFC 6797.

Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context. It is a Candidate Recommendation of the W3C working group on Web Application Security, widely supported by modern web browsers. CSP provides a standard method for website owners to declare approved origins of content that browsers should be allowed to load on that website—covered types are JavaScript, CSS, HTML frames, web workers, fonts, images, embeddable objects such as Java applets, ActiveX, audio and video files, and other HTML5 features.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

Mozilla is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, publishes and supports Mozilla products, thereby promoting exclusively free software and open standards, with only minor exceptions. The community is supported institutionally by the non-profit Mozilla Foundation and its tax-paying subsidiary, the Mozilla Corporation.

IronVest, is a browser extension biometric fraud prevention company that develops and markets fraud prevention products for consumers and businesses, founded in 2022. The IronVest consumer security and privacy app and browser extension evolved from Blur, a privacy product designed to block trackers and provide masking tools, developed by Abine, a privacy company headquartered in Boston, Massachusetts, and first released for Firefox in March 2011. There is a free version, and a paid one with more features.

References

  1. Edmund Tardos (October 8, 2007) Revealed: the brains behind Bugmenot , Sydney Morning Herald, Fairfax, Accessed 2007-10-08.
  2. Metz, Rachel (20 July 2004). "We don't need no stinkin' login". Wired.
  3. Frequently Asked Questions - Bugmenot.com. . URL: "Frequently Asked Questions - Bugmenot.com". Archived from the original on August 5, 2013. Retrieved July 5, 2013.. Accessed: 2013-07-04. (Archived by WebCite® at )
  4. "Bug Me Not for Android". BugMeNot on Google Play.
  5. "Block A Site". Bugmenot.com. Archived from the original on October 13, 2007.
  6. "wikipedia.net passwords - BugMeNot". bugmenot.com. Retrieved 2015-10-05.
  7. Metz, Rachel (August 23, 2004). "BugMeNot Gets Booted, Restored". Wired .
  8. Jardin, Xeni. "Bugmenot.com returns, spokesbugperson says some news sites trying to block it Archived August 31, 2004, at the Wayback Machine ". Boing Boing . August 20, 2004.
  9. BugMeNot. "Terms of Use". Accessed April 8, 2006.