adam:ONE® assist
Allows the user to easily initiate an unblock request when an HTTPS site was denied by the adam:ONE® system.
Enhances the user experience for adam:ONE® users (formerly known as DNSthingy™)
- Display the Block Page for denied HTTPS sites.
- List website dependencies.
- Allow Google's reCAPTCHA to function when Google domains are denied.
- Display protection status behind adam:ONE®.
Version 2.0.7
- Update to Manifest V3
Latest reviews
You really need to disclose that you have a listener set up in the background via blockedhttpsdetector_background.js that literally catches ALL error URLs, and apparently ALL headers of sites I browse to your site of http://mytools.management/isblocked". Nowhere in the description or installation does it inform me as the user that my ENTIRE browsing history/activity is potentially being not only sent to your site (privacy) but then what obviously happens to my browsing performance if/when we all have to first send our traffic through your site?!? This alone takes it from a five-star extension to a one(zero)-star IMO and no way I'll continue to use it.
You really need to disclose that you have a listener set up in the background via blockedhttpsdetector_background.js that literally catches ALL error URLs, and apparently ALL headers of sites I browse to your site of http://mytools.management/isblocked". Nowhere in the description or installation does it inform me as the user that my ENTIRE browsing history/activity is potentially being not only sent to your site (privacy) but then what obviously happens to my browsing performance if/when we all have to first send our traffic through your site?!? This alone takes it from a five-star extension to a one(zero)-star IMO and no way I'll continue to use it.
Before DNSThingy, I thought Cisco's Umbrella product was my best line of protection, except for the bypass of DNS lookups via HTTPS. DNSThingy's DTTS product is a singularly brilliant strategy to enforce protection at Layer 2 -- by assuring any outgoing connection is first qualified via a FQDN which allows one to evaluate the domain's reputation BEFORE allowing the connection!
Before DNSThingy, I thought Cisco's Umbrella product was my best line of protection, except for the bypass of DNS lookups via HTTPS. DNSThingy's DTTS product is a singularly brilliant strategy to enforce protection at Layer 2 -- by assuring any outgoing connection is first qualified via a FQDN which allows one to evaluate the domain's reputation BEFORE allowing the connection!
Simple, straigforward, valuable. Indispensable for using with HTTP Request Blocker extension.
Makes whitelisting possible!
Makes whitelisting possible!
Excellent! Solved my problem!
Excellent! Solved my problem!
I use this every day.
I use this every day.
Great tool to have when trying to manage white-lists.
Great tool to have when trying to manage white-lists.
Great extension!
Great extension!