A large third-party accessibility script is currently under an active DNS poisoning attack, served by @Cloudflare's Israeli endpoint:

$ dig +short @

Malicious host is serving a message supporting

· · Web · 0 · 1 · 1
Sign in to participate in the conversation

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!