How does it work?

This commit is contained in:
Casper V. Kristensen 2024-08-05 22:02:37 +02:00
parent e15a8e3ce0
commit b8374c1c67

View file

@ -5,7 +5,7 @@ internet surveillance](https://ulovliglogning.dk/). Privacy through obscurity?
<video src="/caspervk/autosurfer/raw/branch/master/img/preview.mp4" controls></video>
# Getting Started
## Getting started
```shell
podman run --rm quay.io/caspervk/autosurfer:latest
```
@ -16,10 +16,24 @@ podman run --rm --network host --env DISPLAY --security-opt label=type:container
```
# Building
## How does it work?
All certificates issued by publicly-trusted Certificate Authorities (CAs) are
published to the [Certificate Transparency (CT)
logs](https://certificate.transparency.dev/). Autosurfer connects to
[Certstream](https://certstream.calidog.io/) to retrieve real-time updates of
newly issued certificates and attempts to open the domain in Firefox using
Selenium.
## Building
```shell
nix build .#oci
./result | podman load
podman run --rm autosurfer:dev
# podman push autosurfer:dev quay.io/caspervk/autosurfer:latest
```
## Future work
- Embed [Certstream server](https://github.com/CaliDog/certstream-server)
rather than relying on hosted service.