https://clck.ru/FHnJJ is the alternative
> ~ $ curl https://clck.ru/FHnJJ
>
>
Redirecting...
> Redirecting...
> You should be redirected automatically to target URL:
> https://sba.yandex.net/redirect?url=https%3A%2F%2Fdebbugs.gnu.org%2Fcgi%2Fbugreport.cgi%3Fbug%3D34607&client=clck&sign=ae74c1736ecb62b804356c42c7186694.
> If not click the link.
>
On Sat, Mar 2, 2019 at 4:37 PM Yuri Khan wrote:
> On Sat, Mar 2, 2019 at 10:35 AM Richard Stallman wrote:
>
> > Is the shortened URL expanded locally inside Emacs?
> > Does it refer to a real website?
> >
> > In the example it gives https://qps.ru/MjrtW as an example, Was
> > https://qps.ru/ chosen by your customization? If so, what made that
> > choice desirable? Why not use sh:e/ (abbreviation of "short:emacs")
> > instead? It is much shorter.
>
> URL shorteners work this way:
>
> 1. Alice gives an ordinary URL to an external web service.
> 2. That service generates a short ID, associates it with the input
> URL, and stores this association into its database.
> 3. It then responds to Alice with a shortened URL composed from the
> service’s prefix and the generated short ID.
> 4. Alice shares the shortened URL with Bob.
> 5. Bob accesses the shortened URL with a browser.
> 6. The web service looks up the ID in its database and retrieves the
> original URL.
> 7. It sends Bob an HTTP response that will, among other things, cause
> his browser to go to the original URL.
>
> So no, the expansion does not happen locally, it happens on the web
> service that generated the shortened URL.
>
> There are trust, integrity, privacy, and availability issues
> associated with URL shorteners:
>
> * Bob does not see where the shortened URL leads. It may expand to a
> link to a malicious resource, and Bob has to rely on his browser’s and
> operating system’s protection when his browser is redirected there.
>
> * The URL shortener service may attempt to track the users who use it
> to shorten or expand URLs, and collect statistics on individual
> shortened URL usage. Some actually offer this as a feature; e.g. Alice
> might learn whether Bob followed the shortened URL she sent.
>
> * The URL shortener service may attempt to display advertisements to
> users who access shortened URLs, before redirecting them to the
> expanded URL.
>
> * The URL shortener service may attempt to run non-free and/or
> malicious Javascript on the users’ browsers. Executing that Javascript
> might or might not be a requirement to obtaining the expanded URL.
>
> * The URL shortener service may be discontinued at any time at the
> decision of its maintainer.
>
> * The URL shortener service’s database may be compromised, changing
> the ID/URL associations.
>
> * The URL shortener service may reside on a host that later becomes
> blocked in a certain country.
>
>
> As an example, I accessed the https://qps.ru/MjrtW link with curl(1).
> I got a 46888-byte response that:
>
> * redirects to https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34607
> after 15 seconds or when the user clicks a hyperlink in the HTML;
> * attempts to load scripts from
> https://pushance.com/ntfc.php?p=2053241&tco=1 and
> https://dolohen.com/apu.php?zoneid=2053231;
> * attempts to load a (presumably tracking) image from
> https://counter.yadro.ru/hit, passing it the shortened URL, the URL of
> the page that referred the user to the shortened URL, the screen pixel
> count and color depth of the user, and a random number generated on
> the user’s browser;
> * displays an advertisement offering free-as-in-beer web forum hosting
> on mybb.ru;
> * and also contains a big unreadable blob of Javascript which I will
> not attempt to reverse-engineer.
>