-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation of an AMP Cache Removal Feature for Enhanced Security against Illegal Content on Compromised Sites #39704
Comments
Still no respond..... |
heya @jefrymey apologies for the late reply as a lot of people were out for the holidays. thank you for this detailed report. I'll get back to you with a response after consulting some folks internally |
Thankyou ^^ |
Hey @erwinmombay, Hope you're doing well. Just checking in about the AMP Cache Removal feature (Issue #39704). Any news on your end about this? We're really keen to know how things are progressing and if there's an estimated timeline for a decision or action. Thanks |
heya @jefrymey I'll try and give a quick response to this. my apologies |
@jefrymey Follow these instructions to fully remove both the hijacked AMP and non-AMP versions of your pages from Google. The |
Thanks, i will check and learn it, thankyou for your reply ^^ |
But wait, this one u give me
But wait, this one you give me is for the site owner, and im not the owner.
why?:
Please, we need this feature |
Gotcha, thanks for explaining further @jefrymey let me get back to you on this. A few additional questions so i can relay the information properly
|
Description
I am reaching out as a representative of the ANTI ONLINE GAMBLING team from Pelita Bangsa University, working in collaboration with the Ministry of Communication and Information Technology of Indonesia. We've been tackling the issue of governmental and educational sites hijacked for illegal gambling, with over 701 such instances identified as of December 19, 2023.
The misuse of AMP by these hacked sites is alarming, as AMP pages remain active in Google's cache even after the primary sites are taken down. This creates a false impression that the sites are still legitimate, misleading citizens and damaging the credibility of our institutions. The AMP pages are effectively aiding hackers by staying accessible via Google SERPs despite site suspension, takedowns, and error statuses like 404 and 403.
Our efforts to combat this, including reporting to hosting services, direct communication with site owners, and using Google’s content removal service, have yielded limited success. The process is slow, manual, and often hindered by the hackers' persistent access to the Google Search Console of the affected sites.
Proposed Feature:
I urge the AMPdev team to consider a feature that mirrors the functionality of Google's content removal tool but is specifically designed for AMP pages. When a site is confirmed to be inactive or compromised, a swift review process should follow, leading to the disconnection of its AMP cache within 24 hours. This would prevent the AMP version of the site from being served to users, thereby protecting them from fraudulent or harmful content.
Alternatives Considered
Current methods, including Google's removal tool, are not fully equipped to address the specific challenges posed by AMP pages. The proposed feature would fill this gap, providing a targeted and streamlined solution for AMP cache issues related to security breaches.
Additional Context
This feature is crucial not just for Indonesia but for any country facing similar challenges. It would significantly improve the security and trustworthiness of the AMP ecosystem, ensuring that AMP continues to serve its purpose without being exploited by malicious actors.
I am willing to provide further information and collaborate closely with the AMPdev team to see this feature implemented. My contact is [email protected] (JEFRY MEY SENDY).
The text was updated successfully, but these errors were encountered: