commit 533b016049473e520193e70156e4b54dc1f19568
Merge: 3f3caef c151f76
Author: Gervase Markham <gerv@mozilla.org>
Date:   Fri Aug 5 12:21:15 2016 +0100

    Merge pull request #222 from qnapnickchang/master
    
    Add myqnapcloud domains to the PSL

commit 3f3caef756b3ea0b91455e12f1700ea5eee8f979
Merge: f5dc88f 4f86291
Author: Gervase Markham <gerv@mozilla.org>
Date:   Thu Aug 4 09:16:21 2016 +0100

    Merge pull request #167 from vincenttseng63/master
    
    Add myasustor.com

commit f5dc88f0ad8a07c33028bae2f5379dd6e55d3b1a
Author: dtharp <davewtharp@gmail.com>
Date:   Sun Jul 31 10:39:26 2016 -0700

    Add browsersafetymark.io (#251)
    
    As for why we are requesting: The site is a privacy and security benchmark. We run a series of tests on the visitor's browser and rank the browser against other browsers that have run the benchmark.
    
    One of the tests we run checks for Tracking Protection via several vectors (third party cookies etc.) We have worked with EFF on this feature, and the test is somewhat involved. One of the factors we look for during the test is that an "ad" is served from a particular domain on at least 3 "first party" sites, and the "ad" is observed doing tracking behavior (setting a third-party cookie for instance). If this scenario is detected, and the browser is capable of protecting against this sort of tracking, we expect a 4th serve of that "ad" to be blocked.
    
    Now, that is all pretty straightforward, but the devil is in the details. One thing to consider is that a user may re-run the test... The first run would pass, but if we used the same domain to serve the "ads", the "ad" would immediately be blocked on a subsequent run because the browser had already registered that domain as a tracker. To get around this without being a Top Level Domain, we'd have to have an infinite number of standard domains serving our test ads. This is clearly not an option.
    
    Our solution is to make browsersafetymark.io a TLD. Then, all we need to do is serve the our test "ads" from a subdomain of browsersafetymark.io. If browsersafetymark.io is a TLD, then third-party1.browsersafetymark.io is seen as a unique domain in the Tracking detection software in the browser. What we have actually done is set up a wildcard DNS entry that points to our test ad server, and we randomize the subdomain we hit for each test. In this way we do actually have an unlimited number of domains to serve our test "ads" from.
    
    This has been tested in a chrome derivative build where we insert the contents of this patch into chrome's working copy and build. The reason we need this in the actual public list is because we want other implementations of Tracking Protection (i.e EFF's Privacy Badger extension) to pass our test. Without an entry in the public list, any new tracking protection implementations would fail our test.

commit 7c288f4469d28d2991a4f0c95a0cb6df6ad57025
Author: linahe <lh3su@virginia.edu>
Date:   Sun Jul 31 13:34:21 2016 -0400

    Add stackspace.space (#272)
    
    Stackspace allows customers to launch and use big data tools hosted on subdomains of stackspace.space.

commit 53d262ab8b2b0fc92d63be16a22a5ca5b6c93bf9
Author: Seth Vincent <sethvincent@gmail.com>
Date:   Sun Jul 31 13:32:36 2016 -0400

    Add static.land (#255)
    
    Subdomains will be user-controlled, we want the various domain highlighting, searching, etc. behavior of browsers to apply to sites at *.static.land, & will allow users to create let's encrypt certs. Usage of *.static.land will be similar to *.github.io.

commit 1df90f84db1a041991a48e46e786705f7161ab4c
Author: Alex Hanselka <ahanselka@users.noreply.github.com>
Date:   Thu Jul 21 02:59:56 2016 -0500

    Add gitlab.io (#268)
    
    GitLab.io is used for GitLab Pages and thus allows arbitrary users to have subdomains.

commit 5fb94da001169028739e2328a619b6580f93ee1a
Author: Anthony Voutas <voutasaurus@gmail.com>
Date:   Tue Jul 19 01:04:20 2016 -0700

    Add backplaneapp.io (#267)
    
    At backplane we issue subdomains of backplaneapp.io to customers in order to bootstrap configuration and testing. These customers are mutually-untrusting. We do not intend to ever serve anything on the backplaneapp.io apex domain directly.

commit 21990d463dd1c489ad44540822923196ae87bdea
Author: Timothy Guan-tin Chien <timdream@gmail.com>
Date:   Wed Jul 13 17:00:31 2016 +0800

    Add a comment on canonical URL (#260)

commit 8e9aba1b72c96a8ed2802703c05ba1ec7f6589ba
Author: Kevin Bridges <kevin@cyberswat.com>
Date:   Sat Jul 9 04:42:12 2016 -0600

    Add drud.io, drud.us (#234)
    
    Drud operates a Platform as a Service (PaaS) supporting Drupal and WordPress Content Management Systems (CMS). Host names under drud.io, and drud.us are under administrative control of Drud prospective customers, customers, partners, and others.

commit fb4a6bce72a86feaf6c38f0a43cd05baf97a9258
Author: sleevi <ryan.sleevi@gmail.com>
Date:   Wed Jul 6 17:50:50 2016 -0700

    Cleanup bad entries (#261)
    
    * Fix the sorting for potager.org
    * Fix the sorting for Amazon AWS
    * Remove trailing whitespace from cn-north-1.compute.amazonaws.com.cn

commit 28e17a0f8f26f1bddfbd62d9861b223efa7792bc
Author: Pierre Carrier <pierre@meteor.com>
Date:   Wed Jul 6 11:32:41 2016 +0000

    Add meteorapp.com (#238)
    
    Customers can freely add subdomains of those domains to their apps
    on our hosting platform, Galaxy.

commit e9f8e87dae08840d3a4369e3d5197fa4607484bb
Author: Marcus Popp <marcus@popp.mx>
Date:   Sun Jul 3 10:25:54 2016 +0200

    Add mycd.eu (#233)
    
    callidomus is providing it's customers access to their homes
    with dyndns and https (with let's encrypt cert).
    They are using XXXX.mycd.eu to access their homes.

commit 1f7f168e8772c1c41c865e4f5f06f3d08285896b
Author: pepe000 <pepe@beep.pl>
Date:   Fri Jul 1 09:49:05 2016 +0200

    Add beep.pl (#254)
    
    Agnat sp o.o. is a hosting provider that provides its customers
    websites within beep.pl domain, DNS, and SSL Certificates with
    LetsEncrypt

commit aa87d27940595ed4a61e726c7dd06860d87fabb6
Author: dgrell <dgrell@users.noreply.github.com>
Date:   Thu Jun 30 15:17:07 2016 +0100

    Add hepforge.org (#158)
    
    hepforge.org provides virtual hosting for individual, independent software projects in high energy physics. Their domains are $projectname.hepforge.org. The various projects do not automatically trust each other.

commit 95c9cdf7f93d2941092b8dcb2a422e23f077c9c1
Author: B. Blechschmidt <blechschmidt@users.noreply.github.com>
Date:   Thu Jun 30 16:16:15 2016 +0200

    Add certmgr.org (#225)
    
    certmgr.org is supposed to become an aiding domain for server management. Any server operator is supposed to be able to obtain a subdomain *.certmgr.org for his server pointing back to the server under the operator's control. In order to avoid the misuse of content on foreign subdomains, strict cookie separation is required.

commit 2a911eec6abb4e03eabd403fb020d0721be1e233
Author: Simon Menke <simon.menke@gmail.com>
Date:   Thu Jun 30 13:47:27 2016 +0200

    Add fhapp.xyz (#194)
    
    fhapp.xyz will soon be hosting arbitrary users' sites.

commit 8f970f618a1334c0aba8dc72e2dad0a1c7a021c2
Author: Simone Carletti <weppos@weppos.net>
Date:   Tue Jun 28 09:27:19 2016 +0200

    Update .JP suffixes (#252)
    
    Remove kosa.kumamoto.jp as requested on June 17th.

commit 90fa72afda2b05e6b0e6fa35aa8b2517e3bcd7a6
Author: Simone Carletti <weppos@weppos.net>
Date:   Mon Jun 27 20:52:28 2016 +0200

    Remove unnecessary words

commit 44d468c4c5fdb9c8118f9358d2ee1596d0160fba
Author: Sylvain Rochet <gradator@gradator.net>
Date:   Mon Jun 27 20:51:29 2016 +0200

    Add tuxfamily.org (#186)
    
    TuxFamily is now automatically provisioning certificates via
    Let's Encrypt for their users on thousands of subdomains of
    tuxfamily.org. We don't use cookies on the main site
    (tuxfamily.org) so being added here is perfectly fine for us.

commit 4f86291250abb1484172b464b9dae27142ceb54e
Author: vincenttseng63 <vincenttseng@asustor.com>
Date:   Mon Jun 27 17:22:17 2016 +0800

    Update public_suffix_list.dat

commit 1c971b08c1e3acb4245251ea3823d593e7457904
Merge: 7b42bb0 a316f97
Author: vincenttseng63 <vincenttseng@asustor.com>
Date:   Mon Jun 27 17:16:56 2016 +0800

    Merge pull request #1 from publicsuffix/master
    
    sync with source

commit 7b42bb0de64896f3c3b262cad1ccc235fad975b0
Author: vincenttseng63 <vincenttseng@asustor.com>
Date:   Mon Jun 27 16:23:01 2016 +0800

    Update public_suffix_list.dat

commit a316f97dfe2a736cd62e38a564e58921c610eebc
Author: ceecko <ceecko@users.noreply.github.com>
Date:   Mon Jun 27 10:07:14 2016 +0200

    Add evennode.com (#201)

commit baa54eccc964bd3d711bb53b3c84f4006cb62103
Author: Aleš Krajník <aleshaczech@users.noreply.github.com>
Date:   Mon Jun 27 09:54:45 2016 +0200

    Add realm.cz (#172)

commit 4054ff0c256d1e6b59bc963b4558b707c485fcc6
Author: nmeilick <github@ac.ganyme.de>
Date:   Sun Jun 26 16:22:36 2016 +0200

    Add logoip.de and logoip.com (#182)

commit d913a661b8daf11cb212f3f8e9d846e35fb7fac4
Author: Leon Rowland <leon@rowland.nl>
Date:   Sun Jun 26 11:33:48 2016 +0200

    Add virtueeldomein.nl (#239)

commit 22db8a51dc87183595d06075543700dbd9ae8105
Author: Damien Tournoud <damien@platform.sh>
Date:   Sun Jun 26 11:30:28 2016 +0200

    Add *.magentosite.cloud (#224)

commit 996b1df00f66cd8b34d3b501cf95ea8bb9e88837
Author: Shopblocks <dev@shopblocks.com>
Date:   Sun Jun 26 10:26:30 2016 +0100

    Add myshopblocks.com (#197)

commit cd57384f88b04bb3b9171477306c77b9cceef120
Author: afcady <afcady@users.noreply.github.com>
Date:   Sun Jun 26 05:07:10 2016 -0400

    Add cryptonomic.net (#127)

commit a00d0121c2eb5f9f56aa398eeee49ac9a99449cb
Author: pallchin-amzn <pallchin@amazon.com>
Date:   Wed Jun 22 10:05:57 2016 -0700

    Correcting error in AWS EC2 China domain (#245)
    
    As member of Amazon AWS EC2, revising EC2 portion of list to target correct China domain.
