When I was in the B4A editor today, MalwareBytes popped up a message saying it blocked B4A.exe trying to communicate with yodfat.b4x.com because it was a suspected phishing site.
Why was B4A going out to that site? What data was it sending to that site?
Ah yes, I had the browser open to b4x.com and B4A.exe was open at the same time. Maybe B4A.com piggy backed on the Opera connection? I never had this MalwareBytes message popup when I was just running B4A.exe. The browser has to be open to b4x.com. It probably is a false positive.
if you google just YODFAT : Doesn't explain the Malwarebytes trap
Yodfat
Moshav in Israel Description
Yodfat, is a moshav shitufi in northern Israel. Located in the Lower Galilee, south of Carmiel and in the vicinity of the Atzmon mountain ridge, north of the Beit Netofa Valley, it falls under the jurisdiction of Misgav Regional Council. In 2018 it had a population of 867. Wikipedia
if you google just YODFAT : Doesn't explain the Malwarebytes trap
Yodfat
Moshav in Israel Description
Yodfat, is a moshav shitufi in northern Israel. Located in the Lower Galilee, south of Carmiel and in the vicinity of the Atzmon mountain ridge, north of the Beit Netofa Valley, it falls under the jurisdiction of Misgav Regional Council. In 2018 it had a population of 867. Wikipedia
This is of course not a phishing site. yodfat.b4x.com is a subdomain of b4x.com which points to a B4J server running on this server.
The name was left for historic reasons (it manages the push notifications of this app: https://play.google.com/store/apps/details?id=anywheresoftware.b4a.yodfat)
This server is also used to check for B4X updates.