Omdat er onveilige connecties lopen - SSL Tracker scan geeft dat reeds aan:
Website is insecure by default
100% of the trackers on this site could be protecting you from NSA snooping. Tell signal.org to fix it.
 All trackers
At least 1 third parties know you are on this webpage.
-signal.org -signal.org
Legend
 Tracker could be tracking safely if this site was secure.
 Tracker does not support secure transmission.
Af te voeren jQuery bibliotheek: jquery	1.11.2.min-cc83565074b3fa7f2283f7f4d56b90ad171ede87008448ed5d2e91c50575bed1	Found in https://signal.org/assets/vendor/jquery-1.11.2.min-cc83565074b3fa7f2283f7f4d56b90ad171ede87008448ed5d2e91c50575bed1.js<br>Vulnerability info:
Medium	2432 3rd party CORS request may execute CVE-2015-9251	1234
Medium	CVE-2015-9251 11974 parseHTML() executes scripts in event handlers	123
Low	CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution	123
Medium	Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Maar het belangrijkste laat dit privacy en security raportje zien:
https://webcookies.org/cookies/signal.org/28514434 TLS-SSL afgekapt op F-niveau. 
Verdachte code hier: 
https://code.jquery.com/jquery-1.11.2.min.js (XSS-DOM scan geeft 43 sources en 19 sinks)
Als CDN gebruiken ze UNPKG -> a la unpkg.com/:package@:version/:file
en dan zitten die weer bij CloudFlare en sluit de cirkelgangzich weer: https://www.shodan.io/host/104.16.125.175
met NivCMS & Zepto. "All your data is/belong to us". Waarvan akte,
luntrus