Not 100% sure if it warrants a thread, but I do want to expose more Kiwis to Cassie, who I think may be on the verge of being a lolcow. View attachment 8615930
Have you been on /soc/ or /r9k/ recently and seen an add that looks like this? Then you've met Cassie, a fat black woman with a form of narcissism or histrionic disorder. Now, this ad may look enticing to you, but if you post on /soc/ and there's even a chance you're white, Cassie has probably added you in an attempt to entice you into giving her money.
So what makes Cassie special? Unlike many attention whores on /soc/, Cassie takes it incredibly personally when you call her what she is - A broke mentally ill Shaniqua with an odd fixation for white dudes. View attachment 8616016
Cassie will go into chimpout mode at the slightest provocation, and unsurprisingly is the most generic of black women, even having an absent white baby daddy and a child, which she vehemently denies having. She unironically thinks that posting in every thread makes her the most important woman on the board. I'm on the fence about making a full-on page about her, because quite frankly I don't like giving attention whores attention. However, she did recently say the #1 phrase that qualifies you for lolcowdom: View attachment 8616061
Other interesting tidbits:
She claims to have an IQ of 130.
Posts her add several times a thread, similar to a certain Colton Lochman.
Claims to be an army vet.
I'm not entirely sold on making a thread, but she may be worth looking into if you're bored.
Did anyone ever write a a full breakdown of what the spur.us thing measures, and how it does it?
I can see the browser fingerprint part, it's the network fingerprint I'm curious about, from a technical standpoint.
Did anyone ever write a a full breakdown of what the spur.us thing measures, and how it does it?
I can see the browser fingerprint part, it's the network fingerprint I'm curious about, from a technical standpoint.
it identifies which proxy service the ip belongs to. that's it. the gay pedophile enlists an army of rVPN connections which are ordinarily impossible to detect as they are indistinguishable from an ordinary consumer broadband user, as they are indeed consumer connections compromised by botnets or malicious apps which lease their IP. he believes that spur's owners take lead pipes to rVPN provider's kneecaps until they agree to give them a list of their active IPs. I'm tempted to believe him. In fact i hope it's true.
it identifies which proxy service the ip belongs to. that's it. the gay pedophile enlists an army of rVPN connections which are ordinarily impossible to detect as they are indistinguishable from an ordinary consumer broadband user, as they are indeed consumer connections compromised by botnets or malicious apps which lease their IP. he believes that spur's owners take lead pipes to rVPN provider's kneecaps until they agree to give them a list of their active IPs. I'm tempted to believe him. In fact i hope it's true.
Identifying the VPN is the end result. What I meant is a breakdown of the network information it collects, and how it collects it.
If you test the data saved by it when posting on 4chan, you'll see that it saves five blocks of info: p/bi (the network data for the call to the 4chan captcha), p/wgl (browser gpu fingerprint), p/win (browser window fingerprint), p/dr, and p/ws. The last two seem to some form of network tests that measure things like how fast the DNS lookup takes, how fast the data transfer was, how fast the entire connection was, etc. That's the part I'd like to read a technical breakdown on since I don't quite get how and why it is done. All I see is that it makes some websocket calls.
My initial thought was that it "triangulates" residential VPNs by how much longer it takes for connections to finish based on non-compromised residential IPs in the same area, but that can't work since it would depend on too many local factors too. Maybe I'm overthinking it.
I'm just curious and want to learn how it works technically, since I like to read up on browser fingerprinting.
it identifies which proxy service the ip belongs to. that's it. the gay pedophile enlists an army of rVPN connections which are ordinarily impossible to detect as they are indistinguishable from an ordinary consumer broadband user, as they are indeed consumer connections compromised by botnets or malicious apps which lease their IP.
This is why choose your VPN carefully. One major example is luminati, an Israeli-owned "VPN" that sells its services to its paying customers from the "free" customers using it as Hola. If you use Hola, quit immediately. Your residential IP is being used by CP spammers and similar scum, and there's a non-zero chance you get busted for that yourself.
(Fun trivia: Barneyfag often used this rVPN.)
Actually, beware any VPN owned by anything from Israel. Not even being anti-Semitic here, but Mossad is basically the most evil intelligence agency anywhere on the planet, and they OWN this shit
it identifies which proxy service the ip belongs to. that's it. the gay pedophile enlists an army of rVPN connections which are ordinarily impossible to detect as they are indistinguishable from an ordinary consumer broadband user, as they are indeed consumer connections compromised by botnets or malicious apps which lease their IP. he believes that spur's owners take lead pipes to rVPN provider's kneecaps until they agree to give them a list of their active IPs. I'm tempted to believe him. In fact i hope it's true.
Identifying the VPN is the end result. What I meant is a breakdown of the network information it collects, and how it collects it.
If you test the data saved by it when posting on 4chan, you'll see that it saves five blocks of info: p/bi (the network data for the call to the 4chan captcha), p/wgl (browser gpu fingerprint), p/win (browser window fingerprint), p/dr, and p/ws. The last two seem to some form of network tests that measure things like how fast the DNS lookup takes, how fast the data transfer was, how fast the entire connection was, etc. That's the part I'd like to read a technical breakdown on since I don't quite get how and why it is done. All I see is that it makes some websocket calls.
My initial thought was that it "triangulates" residential VPNs by how much longer it takes for connections to finish based on non-compromised residential IPs in the same area, but that can't work since it would depend on too many local factors too. Maybe I'm overthinking it.
I'm just curious and want to learn how it works technically, since I like to read up on browser fingerprinting.
This ping checking thing that you suggested could be mitigated by running the bots from a VPS in the target country. Not saying this is not worth looking into though because it would still make it more annoying to do such an attack.
The nuclear option against residential proxies imo is just blocking third world countries because the cheapest proxies come from retarded shitskins downloading software that "pimps" their IP out like that (which is unfeasible for 4chan to do as they're mostly brown, lol). And so they'd be forced to use the more expensive and limited first world residential proxies.
It's got even worse, lol at people trying to normalise this, it's got even worse. How about they just fucking update the website instead of making you turn off your VPN go through a shapes identification process no one is going to do to make one shitpost.
View attachment 8578609
I think I'm done for good with this site. It's one thing to keep fucking with the captchas in an increasingly obvious attempt to push people to 4chan passes but really the entire site is nothing but constant fuck yous to its users. Shitty moderation, shitty userbase, shitty codebase(where are the god damn sound mp4s/webms, I'm not jumping through hoops uploading a seperate audio track to catbox and then hardcoding that link to my image for something as simple as audio), I'm done and I think I'll be a far happier man for it.
Aside from even nicher (bordering on dead) imageboards, RPGCodex, RPGHQ, here, and maybe a tiny amount of other sites I probably don't know of, there really is nowhere else (that's public) for anyone who's even mildly "based" to go. Probably even worse now given the influx of new users here.
The unofficial /v/ generals (like Fire Emblem and Uma Musume) sometimes actually talk about the games very rarely though let's be real, meanwhile /vg/ generals always - without fail mind you, eventually devolve into dramafagging around a clique of thread celebrities.
Aside from even nicher (bordering on dead) imageboards, RPGCodex, RPGHQ, here, and maybe a tiny amount of other sites I probably don't know of, there really is nowhere else (that's public) for anyone who's even mildly "based" to go. Probably even worse now given the influx of new users here.