review vulnerability to BREACH attacks
The technique works by exploiting patterns of similarity in compressed HTTPS responses. Turning of gzip compression on the server response avoids the vulnerability at the expense of increased bandwidth.
Goal of this task is to determine which, if any, services provided by DataONE are vulnerable (i.e. provide interesting information) to an attacker.