Automatic Fingerprinting of Websites Automatisk Fingeravtryckning Av

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Fingerprinting of Websites Automatisk Fingeravtryckning Av DEGREE PROJECT IN COMPUTER ENGINEERING, FIRST CYCLE, 15 CREDITS STOCKHOLM, SWEDEN 2020 Automatic fingerprinting of websites Using clustering and multiple bag-of-words models Automatisk fingeravtryckning av hemsidor Med användning av klustring och flera ordvektormodeller ALFRED BERG NORTON LAMBERG KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ENGINEERING SCIENCES IN CHEMISTRY, BIOTECHNOLOGY AND HEALTH Automatic fingerprinting of websites Using clustering and multiple bag-of-words models Automatisk fingeravtryckning av hemsidor Med användning av klustring och flera ordvektormodeller Alfred Berg Norton Lamberg Examensarbete inom Datateknik, Grundnivå, 15 hp Handledare: Shahid Raza Examinator: Ibrahim Orhan TRITA-CBH-GRU-2020:060 KTH Skolan för kemi, bioteknologi och hälsa 141 52 Huddinge, Sverige Abstract Fingerprinting a website is the process of identifying what technologies a website uses, such as their used web applications and JavaScript frameworks. Current fingerprinting methods use manually created fingerprints for each technology it looks for. These fingerprints consist of multiple text strings that are matched against an HTTP response from a website. Creating these fingerprints for each technology can be time-consuming, which limits what technologies fingerprints can be built for. This thesis presents a potential solution by utilizing unsupervised machine learning techniques to cluster websites by their used web application and JavaScript frameworks, without requiring manually created fingerprints. Our solution uses multiple bag-of-words models combined with the dimensionality reduction technique t-SNE and clustering algorithm OPTICS. Results show that some technologies, for example, Drupal, achieve a precision of 0.731 and recall of 0.485 without any training data. These results lead to the conclusion that the proposed solution could plausibly be used to cluster websites by their web application and JavaScript frameworks in use. However, further work is needed to increase the precision and recall of the results. Keywords Clustering, fingerprinting, OPTICS, t-SNE, headless browser, bag-of-words, unsupervised machine learning Sammanfattning Att ta fingeravtryck av en hemsida innebär att identifiera vilka teknologier som en hemsida använder, såsom dess webbapplikationer och JavaScript-ramverk. Nuvarande metoder för att göra fingeravtryckningar av hemsidor använder sig av manuellt skapade fingeravtryck för varje teknologi som de letar efter. Dessa fingeravtryck består av flera textsträngar som matchas mot HTTP-svar från hemsidor. Att skapa fingeravtryck kan vara en tidskrävande process vilket begränsar vilka teknologier som fingeravtryck kan skapas för. Den här rapporten presenterar en potentiell lösning genom att utnyttja oövervakade maskininlärningstekniker för att klustra hemsidor efter vilka webbapplikationer och JavaScript-ramverk som används, utan att manuellt skapa fingeravtryck. Detta uppnås genom att använda flera ordvektormodeller tillsammans med dimensionalitetreducerings-tekniken t-SNE och klustringsalgoritmen OPTICS. Resultatet visar att vissa teknologier, till exempel Drupal, får en precision på 0,731 och en recall på 0,485 utan någon träningsdata. Detta leder till slutsatsen att den föreslagna lösningen möjligtvis kan användas för att klustra hemsidor efter de webbapplikationer och JavaScript-ramverk som används. Men mera arbete behövs för att öka precision och recall av resultaten. Nyckelord Klustring, fingeravtryckning, OPTICS, t-SNE, huvudlös webbläsare, ordvektor, oövervakad maskininlärning Acknowledgment We would like to give a special thanks to Tom Hudson for offering technical counsel during the writing of this thesis, and for providing the basis of the data collection tool that we could continue to develop upon. Table of contents 1 Introduction .......................................................................................................1 1.1 Problem statement ....................................................................................... 1 1.2 Goal of the project ....................................................................................... 1 1.3 Scope of the project and limitations ............................................................. 2 2 Theory and background....................................................................................3 2.1 Fingerprinting ............................................................................................... 3 2.2 Headless browser ........................................................................................ 4 2.3 JavaScript window object ............................................................................. 5 2.4 HTML document .......................................................................................... 5 2.5 Supervised and unsupervised learning ........................................................ 6 2.6 Clustering ..................................................................................................... 6 2.6.1 Partitional clustering algorithms............................................................. 6 2.6.2 Hierarchical clustering algorithms.......................................................... 7 2.6.3 Density-based clustering ....................................................................... 8 2.6.4 Clustering performance evaluation ...................................................... 11 2.7 Dimensionality Reduction and sample size................................................ 12 2.7.1 Sample Size ........................................................................................ 12 2.7.2 Curse of dimensionality ....................................................................... 13 2.7.3 SVD and truncated SVD ...................................................................... 13 2.7.4 t-SNE ................................................................................................... 14 2.8 Feature extraction ...................................................................................... 15 2.8.1 Bag-of-Words ...................................................................................... 15 2.8.2 N-Gram ............................................................................................... 16 2.9 Related Works ........................................................................................... 16 3 Methodology ....................................................................................................19 3.1 Supervised learning or unsupervised learning ........................................... 19 3.2 Data collection ........................................................................................... 19 3.3 Feature extraction ...................................................................................... 22 3.3.1 Dimensionality Reduction .................................................................... 24 3.3.2 Clustering algorithm ............................................................................ 24 3.4 Alternative method ..................................................................................... 25 3.5 Architecture ................................................................................................ 26 3.5.1 Hardware ............................................................................................. 26 3.5.2 Software .............................................................................................. 27 4 Results ............................................................................................................ 29 4.1 Labeling the data for comparison ............................................................... 29 4.2 Results of our method ................................................................................ 29 4.2.1 Dataset ................................................................................................ 30 4.2.2 K-Means clustering .............................................................................. 32 4.2.3 OPTICS clustering ............................................................................... 33 4.3 Observations .............................................................................................. 34 4.3.1 Truncated SVD .................................................................................... 34 4.3.2 Wappalyzer false negative .................................................................. 35 4.3.3 Empty and almost empty data from sites............................................. 36 4.4 Runtime...................................................................................................... 38 4.5 Evaluation results ....................................................................................... 39 4.5.1 Wordpress ........................................................................................... 40 4.5.2 jQuery .................................................................................................. 42 4.5.3 Drupal .................................................................................................. 44 4.5.4 ASP.NET ............................................................................................. 46 4.5.5 AddThis ............................................................................................... 48 5 Discussion ...................................................................................................... 51 5.1 Clustering results ......................................................................................
Recommended publications
  • Delete Query in Php with Where Clause
    Delete Query In Php With Where Clause butAgrostological electrified her Walden din remotely. still stakes: Arrayed undeceivable and geologic and pillaredEnrico neverTeodorico summer niggardizing proudly when quite Winnagonistically referred uncivilly.his scabrousness. Joe couch his volcanologist donned conversably, but silky Tharen never brine so In this title links that by a button the name, the link from ingesting, which may offer opportunities to query with an object as a query would cause conflicts that extends zend_db_table_abstract If in the query in delete with php where clause, also have honored the! PHP MySQLi Prepared Statements Tutorial to Prevent SQL. Produces: LEFT JOIN comments ON comments. Sql where clause exactly the deleted values. CodeIgniter Delete Query W3Schools Tutorialspoint W3Adda. The sacrifice is set until its default value. Click affair the rock to show relevant links that substantial support tech notes, APAR defect info, and videos that you can overlap to continue reading content journey we get the info that i need. In clause that deletes a table of the use either truncate table name. Php delete row mysql Code Example Grepper. If i omit that WHERE has all records will be deleted The students. Assume our view page in delete statement is used like clause with and since it will help you execute bulk changes on google cloud spanner. Return deleted in php script i find a query clauses with queries that deletes the where all. This a dml statement and because a page i cannot load all the from the in delete php code? HCL will search select IBM collaboration, commerce, digital experience and security software products.
    [Show full text]
  • Bakalářská Práce
    TECHNICKÁ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborových studií BAKALÁŘSKÁ PRÁCE Liberec 2013 Jaroslav Jakoubě Příloha A TECHNICKÁ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborových studií Studijní program: B2646 – Informační technologie Studijní obor: 1802R007 – Informační technologie Srovnání databázových knihoven v PHP Benchmark of database libraries for PHP Bakalářská práce Autor: Jaroslav Jakoubě Vedoucí práce: Mgr. Jiří Vraný, Ph.D. V Liberci 15. 5. 2013 Prohlášení Byl(a) jsem seznámen(a) s tím, že na mou bakalářskou práci se plně vztahuje zákon č. 121/2000 Sb., o právu autorském, zejména § 60 – školní dílo. Beru na vědomí, že Technická univerzita v Liberci (TUL) nezasahuje do mých autorských práv užitím mé bakalářské práce pro vnitřní potřebu TUL. Užiji-li bakalářskou práci nebo poskytnu-li licenci k jejímu využití, jsem si vědom povinnosti informovat o této skutečnosti TUL; v tomto případě má TUL právo ode mne požadovat úhradu nákladů, které vynaložila na vytvoření díla, až do jejich skutečné výše. Bakalářskou práci jsem vypracoval(a) samostatně s použitím uvedené literatury a na základě konzultací s vedoucím bakalářské práce a konzultantem. Datum Podpis 3 Abstrakt Česká verze: Tato bakalářská práce se zabývá srovnávacím testem webových aplikací psaných v programovacím skriptovacím jazyce PHP, které využívají různé knihovny pro komunikaci s databází. Hlavní důraz při hodnocení výsledků byl kladen na rychlost odezvy při zasílání jednotlivých požadavků. V rámci řešení byly zjišťovány dostupné metodiky určené na porovnávání těchto projektů. Byl také proveden průzkum zjišťující, které frameworky jsou nejvíce používané. Klíčová slova: Testování, PHP, webové aplikace, framework, knihovny English version: This bachelor’s thesis is focused on benchmarking of the PHP frameworks and their database libraries used for creating web applications.
    [Show full text]
  • Lightweight Django USING REST, WEBSOCKETS & BACKBONE
    Lightweight Django USING REST, WEBSOCKETS & BACKBONE Julia Elman & Mark Lavin Lightweight Django LightweightDjango How can you take advantage of the Django framework to integrate complex “A great resource for client-side interactions and real-time features into your web applications? going beyond traditional Through a series of rapid application development projects, this hands-on book shows experienced Django developers how to include REST APIs, apps and learning how WebSockets, and client-side MVC frameworks such as Backbone.js into Django can power the new or existing projects. backend of single-page Learn how to make the most of Django’s decoupled design by choosing web applications.” the components you need to build the lightweight applications you want. —Aymeric Augustin Once you finish this book, you’ll know how to build single-page applications Django core developer, CTO, oscaro.com that respond to interactions in real time. If you’re familiar with Python and JavaScript, you’re good to go. “Such a good idea—I think this will lower the barrier ■ Learn a lightweight approach for starting a new Django project of entry for developers ■ Break reusable applications into smaller services that even more… the more communicate with one another I read, the more excited ■ Create a static, rapid prototyping site as a scaffold for websites and applications I am!” —Barbara Shaurette ■ Build a REST API with django-rest-framework Python Developer, Cox Media Group ■ Learn how to use Django with the Backbone.js MVC framework ■ Create a single-page web application on top of your REST API Lightweight ■ Integrate real-time features with WebSockets and the Tornado networking library ■ Use the book’s code-driven examples in your own projects Julia Elman, a frontend developer and tech education advocate, started learning Django in 2008 while working at World Online.
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Assignment of Master's Thesis
    ASSIGNMENT OF MASTER’S THESIS Title: Git-based Wiki System Student: Bc. Jaroslav Šmolík Supervisor: Ing. Jakub Jirůtka Study Programme: Informatics Study Branch: Web and Software Engineering Department: Department of Software Engineering Validity: Until the end of summer semester 2018/19 Instructions The goal of this thesis is to create a wiki system suitable for community (software) projects, focused on technically oriented users. The system must meet the following requirements: • All data is stored in a Git repository. • System provides access control. • System supports AsciiDoc and Markdown, it is extensible for other markup languages. • Full-featured user access via Git and CLI is provided. • System includes a web interface for wiki browsing and management. Its editor works with raw markup and offers syntax highlighting, live preview and interactive UI for selected elements (e.g. image insertion). Proceed in the following manner: 1. Compare and analyse the most popular F/OSS wiki systems with regard to the given criteria. 2. Design the system, perform usability testing. 3. Implement the system in JavaScript. Source code must be reasonably documented and covered with automatic tests. 4. Create a user manual and deployment instructions. References Will be provided by the supervisor. Ing. Michal Valenta, Ph.D. doc. RNDr. Ing. Marcel Jiřina, Ph.D. Head of Department Dean Prague January 3, 2018 Czech Technical University in Prague Faculty of Information Technology Department of Software Engineering Master’s thesis Git-based Wiki System Bc. Jaroslav Šmolík Supervisor: Ing. Jakub Jirůtka 10th May 2018 Acknowledgements I would like to thank my supervisor Ing. Jakub Jirutka for his everlasting interest in the thesis, his punctual constructive feedback and for guiding me, when I found myself in the need for the words of wisdom and experience.
    [Show full text]
  • Chrome Devtools Protocol (CDP)
    e e c r i è t t s s u i n J i a M l e d Headless Chr me Automation with THE CRRRI PACKAGE Romain Lesur Deputy Head of the Statistical Service Retrouvez-nous sur justice.gouv.fr Web browser A web browser is like a shadow puppet theater Suyash Dwivedi CC BY-SA 4.0 via Wikimedia Commons Ministère crrri package — Headless Automation with p. 2 de la Justice Behind the scenes The puppet masters Mr.Niwat Tantayanusorn, Ph.D. CC BY-SA 4.0 via Wikimedia Commons Ministère crrri package — Headless Automation with p. 3 de la Justice What is a headless browser? Turn off the light: no visual interface Be the stage director… in the dark! Kent Wang from London, United Kingdom CC BY-SA 2.0 via Wikimedia Commons Ministère crrri package — Headless Automation with p. 4 de la Justice Some use cases Responsible web scraping (with JavaScript generated content) Webpages screenshots PDF generation Testing websites (or Shiny apps) Ministère crrri package — Headless Automation with p. 5 de la Justice Related packages {RSelenium} client for Selenium WebDriver, requires a Selenium server Headless browser is an old (Java). topic {webshot}, {webdriver} relies on the abandoned PhantomJS library. {hrbrmstr/htmlunit} uses the HtmlUnit Java library. {hrbrmstr/splashr} uses the Splash python library. {hrbrmstr/decapitated} uses headless Chrome command-line instructions or the Node.js gepetto module (built-on top of the puppeteer Node.js module) Ministère crrri package — Headless Automation with p. 6 de la Justice Headless Chr me Basic tasks can be executed using command-line
    [Show full text]
  • Preview Grav Tutorial (PDF Version)
    Grav About the Tutorial Grav is a flat-file based content management system which doesn't use database to store the content instead it uses text file (.txt) or markdown (.md) file to store the content. The flat-file part specifically refers to the readable text and it handles the content in an easy way which can be simple for a developer. Audience This tutorial has been prepared for anyone who has a basic knowledge of Markdown and has an urge to develop websites. After completing this tutorial, you will find yourself at a moderate level of expertise in developing websites using Grav. Prerequisites Before you start proceeding with this tutorial, we assume that you are already aware about the basics of Markdown. If you are not well aware of these concepts, then we will suggest you to go through our short tutorials on Markdown. Copyright & Disclaimer Copyright 2017 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected] i Grav Table of Contents About the Tutorial ...................................................................................................................................
    [Show full text]
  • Google Chrome Post Request Extension
    Google Chrome Post Request Extension Hermaphroditic and augmenting Templeton quaking almost lustfully, though Gustaf inosculated his aspirations contracts. Otto singsong her regur complexly, she call it impassably. Old-rose and sedged Bennet timbers some tenderfoots so delusively! Extension will install automatically after dropping on extensions page. This can commonly be found by going to the start menu and scrolling down the all programs list until you find the appropriate program or app. Sometimes, it is the best first step if you simply want to move away from Google Ecosystem. Chrome will generate a request for a license to decrypt that media. Is Computer Science necessary or useful for programmers? Insomnia is a powerful HTTP tool belt in one intuitive app. Barth, the proof, Google also announced its plan to crack down on websites that make people involuntarily subscribe to mobile subscription plans. Thank you for your help. How much do you use JMeter and how do you use it for simulating users playing the game or just a service that maybe consumed by a particular game? Again, you set one extremely secure password. Not only can CRXcavator help organizations manage their allowlist, but the entire Google Ecosystem. Once you select the HTTP request, for keeping us informed, the server is assumed to have responded with these response headers instead. Browsers are beginning to upgrade and block insecure requests. You can setup all the headers and all the cookies and everything the way you want it and then check the response when it comes back. Network view or waterfall chart. Jadali found usernames, user interface, and so on.
    [Show full text]
  • Installation Guide
    Oracle® Communications Session Monitor Installation Guide Release 4.3 F27697-02 July 2020 Oracle Communications Session Monitor Installation Guide, Release 4.3 F27697-02 Copyright © 2014, 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition
    [Show full text]
  • PDF Download Extending Symfony2 Web Application Framework
    EXTENDING SYMFONY2 WEB APPLICATION FRAMEWORK PDF, EPUB, EBOOK Sebastien Armand | 140 pages | 30 Mar 2014 | Packt Publishing Limited | 9781783287192 | English | Birmingham, United Kingdom Extending Symfony2 Web Application Framework PDF Book It relied on Git submodules the composer did not exist back then. Drupal is used by numerous local businesses to global corporations and diverse organizations all across the globe. What I like most is the variety of content mixed with best practices for web development. The service definitions are then all cached so that we don't have to compile the container again. Symfony aims to speed up the creation and maintenance of web applications and to replace repetitive coding tasks. The controller makes sure that a user can join a meetup. Our class has only one method that geocodes an IP address and returns a set of coordinates based on the required precision. PHP 7, which is a popular open source scripting language, is used to build modular functions for your software. If you look into the code, version 1. We also reviewed how to use events to keep your code logic where it belongs and avoid cluttering your controllers with unwanted code. Git Best Practices Guide. Next Page. As always, backward compatibility means that you should be able to upgrade easily without changing anything in your code. Previous experience with Drupal is a must to unleash the full potential of this book. This book is a collection of Yii2 recipes. Modular Programming with PHP 7. So you can easily reproduce them in your environment and learn Yii2 fast and without tears.
    [Show full text]
  • Chapter 23: War and Revolution, 1914-1919
    The Twentieth- Century Crisis 1914–1945 The eriod in Perspective The period between 1914 and 1945 was one of the most destructive in the history of humankind. As many as 60 million people died as a result of World Wars I and II, the global conflicts that began and ended this era. As World War I was followed by revolutions, the Great Depression, totalitarian regimes, and the horrors of World War II, it appeared to many that European civilization had become a nightmare. By 1945, the era of European domination over world affairs had been severely shaken. With the decline of Western power, a new era of world history was about to begin. Primary Sources Library See pages 998–999 for primary source readings to accompany Unit 5. ᮡ Gate, Dachau Memorial Use The World History Primary Source Document Library CD-ROM to find additional primary sources about The Twentieth-Century Crisis. ᮣ Former Russian pris- oners of war honor the American troops who freed them. 710 “Never in the field of human conflict was so much owed by so many to so few.” —Winston Churchill International ➊ ➋ Peacekeeping Until the 1900s, with the exception of the Seven Years’ War, never ➌ in history had there been a conflict that literally spanned the globe. The twentieth century witnessed two world wars and numerous regional conflicts. As the scope of war grew, so did international commitment to collective security, where a group of nations join together to promote peace and protect human life. 1914–1918 1919 1939–1945 World War I League of Nations World War II is fought created to prevent wars is fought ➊ Europe The League of Nations At the end of World War I, the victorious nations set up a “general associa- tion of nations” called the League of Nations, which would settle interna- tional disputes and avoid war.
    [Show full text]
  • Customization of an Enterprise Request Management System
    ISSN (Online) 2393-8021 ISSN (Print) 2394-1588 International Advanced Research Journal in Science, Engineering and Technology Vol. 2, Issue 2, February 2015 Customization of an Enterprise request Management System 1 2 3 4 Ashna Shah , Chinmay Balutkar , Bhargavee Singh , Rajesh. B. Singh Student, Computer Department, Sinhgad Institute Of technology, Lonavala, India 1,2,3 Associate Professor, Computer Department, Sinhgad Institute Of technology, Lonavala, India4 Abstract: Information provided in issue reports are relevant and complete in order to help resolve issues quickly. However, often such information trickles to developers after several iterations of communication between End user and reporters. This paper addresses the concerns of Customization of an Enterprise management system by proposing for handling of the issues such as bugs, query and enhancements. As a proof-of-concept, we also demonstrate a prototype interactive enterprise request management system that gathers relevant information from the user and identifies files that need to be fixed to resolve the issues. The main contribution of this application is in the domain of business as we are developing Enterprise request Management System. Keywords: Bugs, Issues, query, enhancement. I. INTRODUCTION The use of Enterprise Request Management Systems as a to the issue and again will report the issue to the reporter. tool to organize maintenance activities is widespread. The Developer then will handle the issues and will fix them. systems serve as a central repository for monitoring the This system will help to manage the issues in the business progress of issue reports, requesting additional information domain by fixing them. The issues might be a bug, query from reporters, and discussing potential solutions for or the enhancement.
    [Show full text]