Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BSNL is NOT injecting ads: it's a CDN server can TinyPass.com in cahoots with Airtel - please update your threads to reflect the same and spread the word #180

Open
Veek opened this issue Dec 26, 2018 · 0 comments

Comments

@Veek
Copy link

Veek commented Dec 26, 2018

Hi, So like everyone else, I've been bombarded with ads on the BSNL network - I examined the src code and concluded that BSNL was injecting ads.

However this is not true and a careful examination of the Browser Call Stack reveals just that
More info here: https://www.reddit.com/r/IndiaSpeaks/comments/a9nsoz/bsnl_is_not_injecting_the_ads_into_our_http/

Basically, since Javascript files are loaded in reverse order, the CDN JS from TinyPass runs first and injects the 117.254.x.x BSNL IP/JS into the browser page. This results in the browser/Console/Network showing a MAGICAL request to a BSNL IP - leading to the erroneous conclusion that BSNL is rewriting the web-page download and inserting code.

The realty is that it's the CDN JS doing all the mischief and the Browser call stack FOR THAT PARTICULAR BSNL/IP DOWNLOAD shows the truth! TinyPass is hosted on an Airtel n/w - developer.tinypass.com to be specific. I've nevr had problems with my BSNL connection and I request everyone to consider the evidence I'm providing carefully since this looks to be a case of Corporate Sabotage.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant