Fijxu

joined 2 years ago
[–] Fijxu@programming.dev 2 points 2 weeks ago (1 children)

Yes, I killed Canada, not worth to host a backend there anymore :3

[–] Fijxu@programming.dev 4 points 2 weeks ago (3 children)

Send us your channel later so I can add replication to your videos on my peertube instance if I feel like it ;)

Mine is https://peertube.nadeko.net/ if anyone is wondering but is more for myself than other people.

[–] Fijxu@programming.dev 17 points 2 weeks ago (1 children)

ID verification for phone numbers.

ALMOST every bank now forces you to have a phone application to authorize payments and each banks implements it in their own way, no standardized way like TOTP (RFC 6238) or Passkeys (WebAuthn), and sometimes those apps force you to use a verified phone (no custom ROM basically) because of security. So if you have no battery (or phone number, because some banks still send you codes trough SMS), you can't authorize transactions.

Most banks use 3rd party, non local AI companies to verify your identify with your face.

Chile :3c

[–] Fijxu@programming.dev 7 points 2 weeks ago (1 children)

Holy shit I opened the webpage and I was stunned with a ad thingy with no button to Decline all but instead with a setting page. Why are sites like this now. At least they ask instead of just doing it without consent, that's a plus.

[–] Fijxu@programming.dev 6 points 3 weeks ago

T-thanks cloudflare!!!

[–] Fijxu@programming.dev 5 points 1 month ago (1 children)

I liked Genshin until I noticed I love more to waste my time programming and doing system administration. Genshit is just time waster 3000 it doesn't even have a good history (my world level was like 50 lol). I played it primarily because it was really similar to Zelda Breath of the Wild

[–] Fijxu@programming.dev 3 points 1 month ago (2 children)
[–] Fijxu@programming.dev 1 points 1 month ago

I think this is not the correct place to ask

[–] Fijxu@programming.dev 11 points 1 month ago (3 children)

Bro I'm not going to wait 15 seconds to read that article fucking cloudflare, takes years to complete on a smartphone.

[–] Fijxu@programming.dev 1 points 2 months ago

70k photos when it was around more than 1 Million

 

This is not a long post, but I wanted to post this somewhere. This may be useful if someone is doing an article about Google or something like that.

While I was changing some things in my server configuration, some user accessed a public folder on my site, I was looking at the access logs of it at the time, everything completely normal up to that point until 10 SECONDS AFTER the user request, a request coming from a Google IP address with Googlebot/2.1; +http://www.google.com/bot.html user-agent hits the same public folder. Then I noticed that the user-agent of the user that accessed that folder was Chrome/131.0.0.0.

I have a subdomain and there is some folders of that subdomain that are actually indexed on the Google search engine, but that specific public folder doesn't appear to be indexed at all and it doesn't show up on searches.

May be that google uses Google Chrome users to discover unindexed paths of the internet and add them to their index?

I know it doesn't sound very shocking because most people here know that Google Chrome is a privacy nightmare and it should be avoided at all times, but I never saw this type of behavior on articles about "why you should avoid Google Chrome" or similar.

I'm not against anyone scrapping the page either since it's public anyways, but the fact they discover new pages of the internet making use of Google Chrome impressed me a little.

Edit: Fixed a typo

 

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the 'mp3' program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as 'telnet', which is used by hackers to connect to machines on the internet without using a telephone.

view more: next ›