(#kf2fo5q) @prologic@twtxt.net And none of them use Yarn-style threading. I donât think theyâre aware of us, theyâre probably using plain twtxt. Other than one hit by @threatcat@tilde.club a few days ago, Iâve seen no traffic from them. đ€
Hmmm, looks like my twt hash algorithm implementation calculates incorrect values. Might be the tilde in the URL that throws something off. :-? At least yarnd and jenny agree on a different hash.
(#uhwlufa) @bender@twtxt.net Hmm, didnât find anything. But you mean a giant bucketload of access_log /home/$USER/logs/access.log if=⊠where the condition matches the requested path for said user? Yeah, that gets annoying very quickly. :-D
(#sxlpyva) This looks like a botnet, to be honest. The IPs are all over the place. Ethopia, Brazil, Kenya, Lebanon, Netherlands, ⊠I mean, thatâs the logical thing to do, isnât it? Do your web crawling on infected PCs. Nobody will block those, because those are the same IP ranges as legitimate requests. And obviously you donât have to pay for computing time.
⊠and they all send invalid HTTP requests, all answered with HTTP 400 ⊠How silly.
I had a brainfart yesterday, though. For whatever reason I thought of subdomains, which are modeled with server entries in nginx. So, each could define its own access_log location. However, there are no subdomains in place! Searching around, I didnât find any solution to give each user their own access log file.
One way would be a cronjob, aeh, systemd timer as I learned the other day, that greps the main access log and writes all user access log files with only the relevant stuff.
GET http://uninformativ.de/projects/lariza/feednotify/datenstrahler/slinp/countty HTTP/1.1
That URL does not exist.
By including http://uninformativ.de in that request, this instructs the webserver to do an HTTP proxy request. Of course, this isnât allowed on my webserver (and shouldnât by allowed on any normal webserver), resulting in HTTP 400. And even if it were, the target would be the exact same server, making a proxy request unnecessary.
And of course, itâs not just 50 hits like this or 100 or 1â000 or 10â000. No, itâs over 150â000 in the last 2 days. All from vastly different IP ranges of different cloud hosters.
This almost looks like a DDoS attack, but itâs just completely stupid. This feels more like some idiot vibe coded a crawler.
I used Gemini (the Google AI) twice at work today, asking about Google Workspace configuration and Google Cloud CLI usage (because we use those a lot). Youâd think that itâd be well-suited for those topics. It answered very confidently, yet completely wrong. Just wrong. Made-up CLI arguments, whatever. It took me a while to notice, though, because itâs so convincing and, well, you implicitly and subconsciously trust the results of the Google AI when asking about Google topics, donât you?
Will it get better over time? Maybe. But what I really want is this:
Good, well-structured, easy-to-read, proper documentation. Google isnât doing too bad in this regard, actually, itâs just that they have so much stuff that itâs hard to find what youâre looking for. Hence âŠ
⊠I want a good search function. Just give me a good fuzzy search for your docs. Thatâs it.
I just donât have the time or energy to constantly second-guess this stuff. Give me something reliable. Something that is designed to do the right thing, not toy around with probabilities. âAI for everythingâ is just the wrong approach.
(#wswlm2q) @lyse@lyse.isobeef.org Yeah, it feels broken. It often needs a couple of retries and a lot of patience. Itâs been like that for months. đ«€
(#bwrwbdq) I spent a few mins on teh tilde website, and for the life of me I canât find a way to contact anyone responsible/accountable for this wonderful little service đ€Ł
(#onzfgpa) @bender@twtxt.net Hahaha! :-D But I actually do like their approach. I donât know what staff should do differently when they are not involved in the channel topic. At least in the general case. Maybe in this specific scenario here they could have cross-checked domains, git repos and stuff like that. But I also reckon that itâs only fair if they treat everybody the same.
(#ulrmviq) @movq@www.uninformativ.de Wow, thatâs a hell lot of food! If it doesnât spoil, itâs easily enough for the rest of your life and all your neighbors and surrounding cities, probably more. :-D
Thatâs a great font. I like it. It just suits the print style incredibly well. No offence, to the absolute contrary, I would not have thought that you actually designed that. It looks just so right. Hats off! :-)
YouTube is completely broken for me for a week or more. The player doesnât even load anymore. Trying to limit the search results to real videos doesnât do shit, etc. Itâs useless. But downloading the videos with yt-dlp still works like a dream.
(#bwrwbdq) @movq@www.uninformativ.de Actually, @threatcat@tilde.club popped up in my own access log first. Thatâs how I discovered the feed. :-) So I figured that this feed author actually sees my reply. The hope is that with the next mention of my feed in threatcatâs feed, the other tilde users, who are following threatcat, are then also informed of my existence. :-)
I donât know how tilde.club is set up. But it should be relatively easy to give all users access to their nginx access logs. Not sure if somebody already requested that or not. But Iâd encourage tilde users to ask for that. Maybe also just for twtxt.txt and/or in a custom, reduced log format.
(#5ara5ka) @lyse@lyse.isobeef.org Thereâs a couple of new users on https://tilde.club, but since this is a shared host, I doubt that they have access to their access.log files. Hence theyâll never see followers, unless we notify them out of band. đ«€
Android shopping list apps disappointed me too many times, so I went back to writing these lists by hand a while ago.
Hereâs whatâs more fun: Write them in Vim and then print them on the dotmatrix printer. đ„ł
And, because I can, I use my own font for that, i.e. ImageMagick renders an image file and then a little tool converts that to ESC/P so I can dump it to /dev/usb/lp0.
(I have so much scrap paper from mail spam lying around that I donât feel too bad about this. All these sheets would go straight to the bin otherwise.)
(#36db6ya) @lyse@lyse.isobeef.org Yeah, Iâm glad Iâm not the only one who didnât get this right. đ You never had to configure a systemd timer? Lucky. đ
(#7tpv2na) @bender@twtxt.net yeah it wasnât so much of a browser thing, more of a security/abuse thing. If you upload large media, we downsize/downscale it, etc.
(#7tpv2na) @bender@twtxt.net The only problem with uploading is the procesing. Do you expect any server-side processing of the WebP or just store and host?
(#gk5t5mq) @bender@twtxt.net No plus-aliases, just aliases. The mailserver runs on my OpenBSB box and is managed using BundleWrap (we use that at work), so to create a new alias, I push a new BundleWrap config to the server.