commit 2f024848fa4bb2b1255f703526debdb6ec5db2c5
Author: Chen Fu <topchenfu@qq.com>
Date:   Fri Oct 28 17:19:14 2016 +0800

    Add more domains for sinacloud (#121)

commit 783e00650a99832dee90a9632d03c6a181872688
Author: Matthias Burtscher <matthias.burtscher@fusonic.net>
Date:   Fri Oct 21 22:29:44 2016 +0200

    Add myfusion.cloud (#306)

commit 7347ef5dca6ea1ccecb7d3dde00cf43002d2f3f1
Author: Simone Carletti <weppos@weppos.net>
Date:   Thu Oct 20 12:39:23 2016 +0200

    Add .CY suffix as per registry request (#321)
    
    > We register domain name directly to .cy (as second level domains)
    > only to specific organization

commit 915565885d0fbd25caf7d8b339cd3478f558da94
Author: Rory <mrbreaker@users.noreply.github.com>
Date:   Wed Oct 19 10:16:09 2016 +0200

    Add TransIP domains (#285)

commit af400e607f3e4ce0d5f5b29355f9ed4ee3c3128d
Author: Gabriel R F <github@gabrf.com>
Date:   Wed Oct 19 05:23:20 2016 -0200

    Fixed typo (#320)
    
    * Add Brazilian states .leg.br
    
    * Fixed typo

commit dc70bb01d4942a045a186bc17b8487c0a38a6c9a
Author: alexdns <noc@cloudns.net>
Date:   Fri Oct 14 01:53:36 2016 +0300

    Add ClouDNS domains (#273)

commit 087bfe495dff9baa0da5187bd1d4997ba7c345ab
Author: maddin <github@maddin.org>
Date:   Thu Oct 13 03:40:54 2016 +0200

    Add Keyweb AG domains (#318)
    
    Closes #310

commit 31f95eb4898c8aa151c7e095d50ed88fa9a0feff
Author: Gabriel R F <github@gabrf.com>
Date:   Wed Oct 12 16:49:03 2016 -0300

    Add Brazilian states .leg.br (#314)

commit 1a8f371fe7a6021ca5d845cb45644dd15a84d6c8
Author: Roy Keene <rkeene@users.noreply.github.com>
Date:   Tue Oct 11 20:25:48 2016 -0500

    Added KnightPoint Systems Horizon public cloud customer public suffix (#311)

commit fd04cf6be91ca060917daf100384cecaa1029e07
Author: Sven Marnach <sven@opencraft.com>
Date:   Wed Oct 12 03:23:37 2016 +0200

    Add opencraft.hosting (#308)

commit 0835563507fad8fa3f2b3dd55d88b46ab301598f
Author: Jack Price <jackprice@outlook.com>
Date:   Wed Oct 12 02:19:54 2016 +0100

    Add Revitalised Limited private domains (#300)

commit 879fa881c3b7282fb118a20cf231b971ef378ad4
Author: BjHe <bhenke@taifun-software.de>
Date:   Wed Oct 12 03:18:41 2016 +0200

    Add TAIFUN Software AG domains (#297)

commit 545f40c746b9db86ea13277711cacc6f34eecb72
Author: Simon Nickerson <simon@nickerson.org.uk>
Date:   Wed Oct 12 02:15:13 2016 +0100

    Add publishproxy.com to PSL (#294)

commit 2c15358a5a9cd2f31598ba40d5a1f2b041d528f3
Author: Cyril B <cbay@alwaysdata.com>
Date:   Wed Oct 12 03:13:48 2016 +0200

    Add alwaysdata.net. (#292)

commit 264da43b037448768e31169b7fd92b11f898707c
Author: Andreas Schnederle-Wagner <schnederle@futureweb.at>
Date:   Wed Oct 12 03:05:14 2016 +0200

    Add Futureweb OG Private Domains (#244)
    
    * Added Futureweb OG Private Domains

commit 3dc2f03af8d87a376a4013b2152cbcc358f3623d
Author: Simone Carletti <weppos@weppos.net>
Date:   Fri Sep 30 14:03:48 2016 +0200

    Update .MZ suffixes according to registry (#307)
    
    We have the following second level domains:
    
        co.mz, net.mz, org.mz, ac.mz, gov.mz, adv.mz,
        mil.mz and edu.mz.
    
    But we also have some domain names which are directly registered
    under .mz like uem.mz, tvcabo.mz, the domains are mostly operators
    like ISPs, but they are few because we are not registering under
    .MZ anymore.

commit 31c48faffdd682bdfd229a6113c33ef53294d7a2
Author: Simone Carletti <weppos@weppos.net>
Date:   Tue Sep 27 23:23:00 2016 +0200

    Remove trailing spaces

commit b4a941a2df2eeaf5e2380311ee6b5e24e2125764
Author: martindehh <martin.meier@protonet.info>
Date:   Fri Aug 26 18:29:25 2016 +0200

    adds protonet.io to the list (#281)
    
    Add protonet.io to the list

commit 56626dc9276665ba222ad4d2a192b78c4038fa3c
Author: Brian Bennett <bahamat@digitalelf.net>
Date:   Tue Aug 16 18:38:15 2016 -0700

    Add Joyent Triton (#266)

commit 852fb25e7151ac97674e22787255044cd2c22481
Author: Nathan O'Sullivan <nathan@mammoth.com.au>
Date:   Wed Aug 17 11:34:02 2016 +1000

    Update public_suffix_list.dat (#283)

commit 4dcaacaf593dde7e2a34436913c24af3bf2bdb06
Author: sleevi <ryan.sleevi@gmail.com>
Date:   Tue Aug 16 17:29:06 2016 -0700

    Add new gTLDs up to 2016-08-17 (#291)
    
    This also moves the KRD entries to the PRIVATE section, to facilitate
    the script automation.

commit 97a6bbabd7bb2464e437eb39a9022cba342138c4
Author: sleevi <ryan.sleevi@gmail.com>
Date:   Tue Aug 16 17:18:41 2016 -0700

    Add wmflabs.org (#290)
    
    * Add wmflabs.org
    
    Closes #284

commit b885a7faef95a226354bf430b870671a0580fa27
Author: globehosting <egresi@globehosting.com>
Date:   Wed Aug 17 03:13:33 2016 +0300

    Add ro.im and shop.ro (#282)
    
    Add ro.im and shop.ro private domains. We allow registration of second level domains using ro.im and shop.ro.

commit f710559ab1d0b78a625e48dec815698c515bcf81
Author: Simone Carletti <weppos@weppos.net>
Date:   Wed Aug 17 01:59:12 2016 +0200

    Move lib.de.us to the private section (#256)
    
    Per the request of lib.de.us, move it from the ICANN section to the PRIVATE section. This is because some browsers, such as Chrome, prevent wildcard certificates for domains in the ICANN section. lib.de.us centrally manages the infrastructure, and thus hosts a wildcard, but subdomains host independent content and thus need the separation afforded by being on the PSL.

commit 923608a7197bc9198b153f2f634a94975db881a6
Author: sleevi <ryan.sleevi@gmail.com>
Date:   Tue Aug 16 16:53:51 2016 -0700

    Add js.org (#289)
    
    * add js.org
    
    Closes #264

commit 666f592ca75ae483b4d3ac91461dd8c53f03c5b7
Author: sleevi <ryan.sleevi@gmail.com>
Date:   Tue Aug 16 16:21:15 2016 -0700

    Update KRD per http://nic.krd/data/krd/Registration%20Policy.pdf (#287)
    
    * Adding co.krd and edu.krd per http://nic.krd/data/krd/Registration%20Policy.pdf
    
    Closes #286

commit 49aedbdb25e36e4e96f11f2ca04406a47e334db4
Author: dkg <dkg@fifthhorseman.net>
Date:   Mon Aug 8 19:31:14 2016 -0400

    remove repo conversion .hgtags file (#280)
    
    The .hgtags file is an artifact of the conversion process that pulled
    the psl out of a mercurial repository into git.
    
    AFAICT, there's no plan to revert the PSL to mercurial.
    
    So at this point, it's an idle artifact that is more likely to cause
    confusion than enlightenment.  We should drop it.

commit 533b016049473e520193e70156e4b54dc1f19568
Merge: 3f3caef c151f76
Author: Gervase Markham <gerv@mozilla.org>
Date:   Fri Aug 5 12:21:15 2016 +0100

    Merge pull request #222 from qnapnickchang/master
    
    Add myqnapcloud domains to the PSL

commit 3f3caef756b3ea0b91455e12f1700ea5eee8f979
Merge: f5dc88f 4f86291
Author: Gervase Markham <gerv@mozilla.org>
Date:   Thu Aug 4 09:16:21 2016 +0100

    Merge pull request #167 from vincenttseng63/master
    
    Add myasustor.com

commit f5dc88f0ad8a07c33028bae2f5379dd6e55d3b1a
Author: dtharp <davewtharp@gmail.com>
Date:   Sun Jul 31 10:39:26 2016 -0700

    Add browsersafetymark.io (#251)
    
    As for why we are requesting: The site is a privacy and security benchmark. We run a series of tests on the visitor's browser and rank the browser against other browsers that have run the benchmark.
    
    One of the tests we run checks for Tracking Protection via several vectors (third party cookies etc.) We have worked with EFF on this feature, and the test is somewhat involved. One of the factors we look for during the test is that an "ad" is served from a particular domain on at least 3 "first party" sites, and the "ad" is observed doing tracking behavior (setting a third-party cookie for instance). If this scenario is detected, and the browser is capable of protecting against this sort of tracking, we expect a 4th serve of that "ad" to be blocked.
    
    Now, that is all pretty straightforward, but the devil is in the details. One thing to consider is that a user may re-run the test... The first run would pass, but if we used the same domain to serve the "ads", the "ad" would immediately be blocked on a subsequent run because the browser had already registered that domain as a tracker. To get around this without being a Top Level Domain, we'd have to have an infinite number of standard domains serving our test ads. This is clearly not an option.
    
    Our solution is to make browsersafetymark.io a TLD. Then, all we need to do is serve the our test "ads" from a subdomain of browsersafetymark.io. If browsersafetymark.io is a TLD, then third-party1.browsersafetymark.io is seen as a unique domain in the Tracking detection software in the browser. What we have actually done is set up a wildcard DNS entry that points to our test ad server, and we randomize the subdomain we hit for each test. In this way we do actually have an unlimited number of domains to serve our test "ads" from.
    
    This has been tested in a chrome derivative build where we insert the contents of this patch into chrome's working copy and build. The reason we need this in the actual public list is because we want other implementations of Tracking Protection (i.e EFF's Privacy Badger extension) to pass our test. Without an entry in the public list, any new tracking protection implementations would fail our test.
