That reminds me of a workmate telling me the other day that my photo albums are blocked by corporate â»âsecurityâ«â trashware, bwahahahaaahaaaaa:
Completely expected from AI bullshit.
da fuq?! Havenât seen this kind of shitâą on IRC since the good âol days of AustNet (now dead right?) when IRC was way more popular than it is today đ€Ł
#IRC #Pornyarnd
that's been around for awhile and is still present in the current version I'm running that lets a person hit a constructed URL like
@prologic@twtxt.net I believe you are not seeing the problem I am describing.
Hit this URL in your web browser:
https://twtxt.net/external?nick=lovetocode999&uri=https://socialmphl.com/story19510368/doujin
Thatâs your pod. I assume you donât have a user named lovetocode999
on your pod. Yet that URL returns HTTP status 200, and generates HTML, complete with a link to https://socialmphl.com/story19510368/doujin
, which is not a twtxt feed (thatâs where the twtxt.txt
link goes if you click it). That link could be to anything, including porn, criminal stuff, etc, and it will appear to be coming from your twtxt.net domain.
What I am saying is that this is a bug. If there is no user lovetocode999
on the pod, hitting this URL should not return HTTP 200 status, and it should definitely not be generating valid HTML with links in it.
Edit: Oops, I misunderstood the purpose of this /external
endpoint. Still, since the uri
is not a yarn
pod, let alone one with a user named lovetocode999
on it, I stand by the belief that URLs like this should be be generating valid HTML with links to unknown sites. Shouldnât it be possible to construct a valid target URL from the nick
and uri
instead of using the podâs /external
endpoint?
yarnd
that's been around for awhile and is still present in the current version I'm running that lets a person hit a constructed URL like
@prologic@twtxt.net @bender@twtxt.net I partially agree with bender on this one I think. The way this person is abusing the /external
endpoint on my pod seems to be to generate legitimate-looking HTML content for external sites, using a username that does not exist on my pod. One âsemantically correctâ thing to do would be to error out if that username does not exist on the pod. Itâs not unlike having a mail server configured as an open relay at this point.
It would also be very helpful to give the pod administrator control over whatâs being fetched this way. I donât want people using my pod to redirect porn sites or whatever. If I could have something as simple as the ability to blacklist URLs thatâd already help.
There is a bug in yarnd
thatâs been around for awhile and is still present in the current version Iâm running that lets a person hit a constructed URL like
YOUR_POD/external?nick=lovetocode999&uri=https://socialmphl.com/story19510368/doujin
and see a legitimate-looking page on YOUR_POD, with an HTTP code 200 (success). From that fake page you can even follow an external feed. Try it yourself, replacing âYOUR_PODâ with the URL of any yarnd
pod you know. Try following the feed.
I think URLs like this should return errors. They should not render HTML, nor produce legitimate-looking pages. This mechanism is ripe for DDoS attacks. My pod gets roughly 70,000 hits per day to URLs like this. Many are porn or other types of content I do not want. At this point, if itâs not fixed soon I am going to have to shut down my pod. @prologic@twtxt.net please have a look.
Plex Users Fear New Feature Will Leak Porn Habits To Their Friends and Family
Many Plex users were alarmed when they got a âweek in reviewâ email last week that showed them what they and their friends had watched on the popular media server software. From a report: Some users are saying that their friendsâ softcore porn habits are being revealed to them with the feature, while others are horrified ⊠â Read more