/t/ - Technology

Discussion of Technology

Catalog Archive
+
-
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0 (Temporarily Dead).



8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(148.21 KB 1280x1856 Asukabun smol.jpeg)

(66.14 KB 750x1000 POW Block.jpg)

POWBlock - Developing a system agnostic Proof of Work backend Anonymous 07/08/2024 (Mon) 01:36:13 No. 15564 [Reply]
You know, it occurs to me that despite being the site's sysadmin, and this being my bro Codexx's board, I literally never post my tech autism here. Maybe I should change that. If you'll pardon me making the equivalent of a /blog thread, I want to talk about some of my current ideas. As some anons are aware, over the past 4 and a half years I've become something of a guru at programming Varnish VCL. 8chan's entire network is bespoke and we've had to deal with requirements that no normal, Cuckflare-and-cloud-storage website needs. As a result I gained an absolute shitfuckload of hands on experience in hacking Varnish code. This has led to a minor obsession with pushing its boundaries, and making it do useful things that it was never designed to do. One thing that's been on my mind for literally *years* was the idea to make Varnish do the Cloudflare thing with a frontal POW and bot detection system. You can do this with Nginx and setups like this: https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS which is what Josh used as the basis of his "Kiwiflare" system. But no such tool exists for Varnish. I wanted to change that, and funnily enough I pulled it off several weeks back. It can be done though careful hacks of the error handling subsystem and abusing the object cache to track user session keys. But then I got to thinking, why hoard it? Since my original system was already using an external validator script (the prototype was written in Bash using netcat rofl) why couldn't I just move the system itself to a fast little backend that was designed to hook up with *any* frontend proxy? Not only would it save me a lot of work in the big picture, but other people might use it too. This became the idea for POWBlock. The first thing I decided was that I wanted it to run as a script. There are several reasons for this but the big ones are: Portability, lack of dependencies, and simplicity. The Bash prototype is obviously garbage from a production standpoint, but Python is fat and fucking slow. There is a reason why the Nginx POW system uses Lua. Lua is small, light, fast, low overhead because it was meant for embedded systems, its in every server repo, and has an HTTP server module with solid security and concurrency. Its not good enough to run a whole website off of, but if you want a zippy little script-based HTTP application like this it is far and away the best choice if its something you actually mean to deploy. Since I wasn't a Luafag I needed to start learning. After a week of reading and basic practice, I decided to move forward with some help from ChatGPT, henceforth called "the nig." I've found over the past year that this is great for practicing code. You learn the very basics, design your program yourself and break it into key sections and functions, throw your ideas and functions at the nig, and then learn as you go because you have to debug its shit and occasionally hand-write functions where the bot can't get it right. Its shockingly effective hands-on learning and I've been picking up Lua in record time. Its also nice to just hand the nig a big block of code you banged out and say "comment all this shit for me." Saves a lot of writing. Now you have the backstory, so let's get into the concept. POWBlock is a Lua-based mini-server that has exactly one job: It runs on a box somewhere and serves as an alternate backend for an existing frontend proxy. When a user visits the shielded site, the proxy can send them to POWBlock and force them through a Cloudflare-style Proof of Work browser check (and eventually other checks), give them a cookie to prove they passed, and send them back to the site. You can do this with Varnish, Nginx, and even fucking Apache. Control is handled by the frontend proxy, where you configure rate limiting and other basic anti-DoS functions to protect POWBlock itself from being flooded out, and it uses a system of custom HTTP headers to communicate and for security. My next post will be the prototype code for the server, so you can get an idea what it does.
2 posts and 1 image omitted.
# luapow.vcl - Varnish module for handling Proof of Work (PoW) authentication import redis; # Define a subroutine to handle POW control sub POW { # Check for POW cookie in the request if (req.http.Cookie) { # Parse cookies cookie.parse(req.http.Cookie); # Get POW cookie value set req.http.Cookie-POW = cookie.get("POW"); # Fetch cached POW value from Redis based on user's IP from X-Forwarded-For set redis_key = "user_pow:" + req.http.X-Forwarded-For; if (!redis.is_error(redis.get("RedisServer", "RedisPort", redis_key))) {

Message too long. Click here to view full text.

(106.43 KB 1170x892 Asuka ohai.jpeg)

This is called a VCL Module. They plug into the main VCL code that drives the caching engine via a leading include"" statement. 8chan's network frontends use about 24 of these that I've written over the years, so this is just one more. But you can see some of what we need to handle: First we scrub all custom header values from the client's side, to make sure he can neither spoof nor see any of the headers or values that we're using. Then we parse the user's Cookies looking for POW, and if it exists we ping the Redis storage for the user's IP address to see if there's a stored value. If both exist, and match, the user is let into the site. If they don't match, we run the rest of the POW subroutine, which: >Generates an X-Pow header with a random 8 character session token >Sends the token to the Redis store keyed to the user's IP address >Sets the magic header >Switches the backend from the 8chan main CDN gateway to the POWBlock server >Saves the URL the user was coming in on and sends it in a header >Connects the user to POWBlock with all necessary information supplied What isn't shown: Forward rate limits, DoS throttling, URL locking, request sanitizing, header normalizing, and a bunch of other shit the main VCL code will do for security before it even gets to this spot. I'm sure it'll need to be tweaked for an actual deploy, but I'll cross that bridge when I get to it. And I need to write a nullification module so that if a user gets past this and fucks around, it will null the value of their key in the shared store and force them back to the POW or even ban them entirely. >Why bother with all this shit and why make a Lua server instead of just putting it on the site, maybe with the splash disclaimer? Because it can take upwards of 60% of the load off the frontends in the case of a major attack. POWBlock can run on its own shitbox server (and even have DDoS protection there) and if the site is getting hammered like hell, then its POWBlock taking most of the assraping instead of the servers we actually care about. And these things are so cheap and easy to set up (install Lua, install 3 Lua modules, stick the script in systemd, fucking done) that the servers it would run on can be wholly disposable. You could have 50 of em, each running a forking instance, and divide a big attack up between them.

Message too long. Click here to view full text.

>>15566 >We also generate a weak but unique "server nonce" that is part of the POW calculation No it isn't you nigger. Also if you do this correctly the nonce controls the size of the table an attacker needs to precalculate challenges and 2 bytes is just 65k unique solutions you double nigger. Additionally I imagine you should also clean server_nonces in case users never complete the pow.

(344.05 KB 1278x344 how to code windows.jpg)

Anonymous 03/16/2021 (Tue) 11:31:58 No. 2967 [Reply]
Why Windows sucks so much?
25 posts and 13 images omitted.
>>15312 >installing Japanese Wangblows 10 for 超寝取られ in a VM running inside Wangblows 10+1 instead of putting LANG=ja_JP.utf8 in front of wine gemu.exe on Gentoo Sodomy defenda.
(1.60 MB 3264x2448 IMG_1580.jpeg)

alguien conoce a ese Daniel? vive en Cumbres Le Fontaine
>>15312 Using Linux and wime/vm for uncompatible software is not that hard, nigger; and yes, tinkering is fun, if you don't find it fun then computers are not for you.

Good Microphone for VA? Anonymous 05/28/2020 (Thu) 22:07:57 No. 272 [Reply]
Hey guys, I'm starting to get into voice-acting, and it's honestly something that I've been wanting to do for a long, long time, so now that I have the money and the time, I wanted to really dive into it. Problem is, I am very inept when it comes to audio technology. I'm doing my best to try and learn about the different kinds of mics, and how to hook them all up, i.e. XLR vs. USB, audio interfaces, etc., and it's SORT OF making sense, but really, there's just a kind of overload of information online. Can you guys just help me decide on a good microphone for voice-acting, even entry-level? I have a Blue Snowball iCE right now, but I'd really like something more professional, even if I have to spend a couple hundred. Thoughts? Recommendations? Two that've caught my attention so far are the Shure Beta 58a and the MXL 990, but I don't want to make a shitty purchase and regret it.
6 posts and 1 image omitted.
i have never used these mics but I hear they're good Shure SM57 SM58 SM58 SM58 SM58 AT4040 AT2035 AKG P220
>>471 These plus SM58 Beta and Rode NT1 is good entry level
<How good is this video?

What Program is Best for Decrypting Opera Login Data Files? Anonymous 10/18/2023 (Wed) 17:02:45 No. 13390 [Reply]
So at the beginning of this year my laptop started to fail and I had to send it into PC world for repair. Not long before I did so I was made to change the password for my Google account. I have always relied on web browsers to remember my passwords for some stupid reason. I was able to copy the contents of my C Drive before I did so and so I thought that I would be able to recover my passwords and such easily. Yet I found that opera now encrypts you passwords based on you dapai code and login details. This was never the case before and it seems stupidly paranoid that go to such lengths. I know them all except the one that has been changed yet that password is pretty vital. So I have spent months looking into this, first I thought that the keys hadn’t copied over but they were hidden and I do have the DPAPI master keys and CREDHIST, I also have found a way to view the encrypted passwords and the ones that are the same are encrypted in similar way so that should also make the password easier to find. Yet I still have not found a program that I could use. Windows password recovery program tells me that I entered my password wrong even though I entered it in right, DataProtectionDecryptor gives me “Failed to extract the encryption key” and mimikatz gives me Error kull_m_dpapi_unprotect_blob ; CryptDecrypt(0x80090005), I also found a bunch of linux and python troon programs that claim to be able to do what I am looking for but they require so many addon programs to be installed that you loose track. What am I doing wrong here? What is the best program that can do what I am looking for?
15 posts and 9 images omitted.
I absolutely hate the state of online accounts now, this two factor bullshit is going to lock me out of every account I've had for years. I'm already permanently locked out of several yahoo accounts because I never even knew they were implementing 2FA, now that they have I have no way back in without paying for premium support, they paywalled my fucking accounts. Worse yet is how many accounts on other websites I used those addresses for. All gone. Because of automatic opt-out enforcement of 2FA bullshit. And can we talk about how much of a fucking joke 2FA is? All it does is protect accounts from the fucking owner, the majority of security breaches are always because of exploits and flawed setups on the SERVER side, nothing to do with bad opsec of the end users. so these services continue to build a personally identifiable profile on the user by grabbing your phone number or forcing you to use proprietary phone apps or hardware keys that I'm convinced can be used to de-anonymize since now you have a trail from the key back to whatever company you bought the hardware key from. The fucking irony is that years ago it was always consider poor security to write down a password instead of using one you could just remember, now with hardware keys you have to create a backup of the secret code in case your key breaks or you lose it so you can recover with a second hardware key, which I've heard several "security tubers" advocate for writing down. In spite of the known security issues with SMS for 2FA, businesses like banks continue to only offer SMS, and google makes sure to block virtual numbers. We live in a fucking INSANE ASYLUM. >>15200 it wouldn't be hard to write a python script that takes things you know are in your password and shuffle them around while also adding numbers/special characters, even without threading you could end up generating a thousand possible combinations within a few seconds
>>15309 There's a bit of a problem with that idea, at least if you're talking about an automated I-forgot-my-password-but-I-think-it-contained-this-string bot. If it doesn't guess right in the first three tries, your account is locked for one hour. Set up a bot to do this. It will not achieve one thousand iterations/sec. It will be limited to 72 iterations/day. Bring a lunch.
>>15359 yeah, to actually try each password will take literally forever because websites block you after so many failed attempts, but if all you wanted was to get every possible combination and hand pick the ones you think might be right, that process alone wouldn't take hardly any time

(108.81 KB 600x400 cicada-husks.jpg)

P2P Imageboard Anonymous 02/29/2024 (Thu) 02:50:00 No. 14729 [Reply]
Sup /t/ I've been working on getting a p2p imageboard functioning for a while and I decided to start fresh more recently with a new project. It's still not fully featured per se, but I feel like releasing it in it's current form since it's still functional and I want to see if it works in the wild. Hopefully you'll be able to see the existing boards and start posting. https://gitgud.io/threshold862543/gladden To install: >install node and yarn (or npm instead of yarn) >run "yarn build" to get the dependencies >run "yarn start" to start the server And you can add whatever boards you like. This basically works like a torrent. Moderation is local, so you can delete files and posts that you don't like, but it won't be deleted for others necessarily (unless everyone else blocks them and there are no more seeders). "Subscribing" to others as moderators so you can trust them to delete for you is also possible I just haven't hooked it all up yet.
4 posts and 3 images omitted.
This already existed in a way via Millchan on Zeronet. >>15280 An idea that I had to fix this was to split every file into two parts, a "file" and a "key", with checks on both sender and recipient to make sure that no user ever possessed both the key and file for the same object at the same time, and that when a file was browsed by a user only then would the network also seek out the key and decode it. But it had to be implemented in a particular way. You can't just encrypt a file because possessing "encrypted CP" is still CP, so the idea was that the file would actually be split somehow, like a pattern of alternating bytes, such that the "file" and "key" were each half of the completed object and not merely an encoding scheme applied to the whole.
>>15298 What about a setting (perhaps on by default) for holding images in RAM only, and only while you have the thread open? Is it still a problem since you technically download and upload the data despite not having it on hard drive?
>>15335 Yeah, exactly. If you had the file, and you browsed the site and it tried to load that file, then your system would request the key from someone and then hold it and the resulting completed object in memory only.

(11.33 KB 187x270 watwat.jpeg)

Structure and interpreation of computer programmes 2022 Anonymous 05/25/2022 (Wed) 19:18:43 No. 8522 [Reply]
Found out theres an javascript version of this book i havent read it yet but iam sure its cool.Its kinda wierd they didnt use a programming language like c or c++
3 posts omitted.
>js How do they deal with such gems?
Fuck that faggot language and fuck the kike authors and publishers for using that faggot language. It's all gone to shit.
>>15208 >>15236 I shouldn't have to explain this, but .... Javascript was originally intended to be "Scheme in the browser", and, as such, it shares far more features with Scheme than C or C++ or Jabba. Of those, modern Jabba is probably the most "functional". Eichmann wrote the original in a week, and then his boss came in and said: "we're going to mooch the publicity of Java, make it look like C, we're calling it Javascript." It is a piece of shit that was written in two weeks. One sprint. I bet the agile fags are sperging.

(2.71 MB 4272x2848 yellow_nigger_gov_fags.jpg)

i hate xiaomi so much bros Anonymous 07/22/2022 (Fri) 07:33:20 No. 8927 [Reply]
>xiaomi says that you can unlock bootloader with their tool >make xiaomi account and do all the stuff you must do to unlock device >download windows because the tool is only available in windows >device not getting recognized >connect xiaomi device with 3 different pcs (win 10 and 11) and download a bunch of drivers >still nothing >a guy in a forum says that you must do it in win 7 and it will work for sure >download win 7 >install win 7 in my pc

Message too long. Click here to view full text.

12 posts omitted.
>>11688 It's not about your formatting per se, it's about you not conforming to imageboard culture. The locals think you're an annoying tourist and want you to either assimilate properly or go back home.
>>8927 > He bought chinkshit You fell for the meme. Sure you can get lucky sometimes, but mostly for anything that needs to be reliable, chinkshit is shit. Plain and simple.
>>8927 Did you get the right drivers? Also I why not just use a VM? Or buy a temp sim.

(73.39 KB 618x864 1.jpg)

Anonymous 10/10/2022 (Mon) 17:15:23 No. 10047 [Reply]
I really want this photo without the watermark and in original resolution (to print it out and get it autographed). Is there any way to dig it out? www*nordicfocus*com/ski-jumping/event/sjwomen-202122-12/view/491683
3 posts and 1 image omitted.
In fact, if you want to print it at HUGEASS size, here's an upscaled version.
>>10360 just tell him how you did it, instead of mocking him, smart-aleck.
>>14818 he did, use your brain nigger

How to unblock factory resetting on a school laptop Anonymous 12/05/2021 (Sun) 04:59:39 No. 6568 [Reply]
So i have a laptop that i was given but factory resetting is blocked the year ended the school said keep it but they left all the admin stuff on it making it inaccessible for actual personal use it is a lenovoe11 think pad and i can't access any administrative setting and can reset it by clicking f12 so what should i do
5 posts omitted.
tldr, you have to disassemble the chromebook, and use a flashprogramer. also, please don't do this with a stolen device. I get that schools give these away without properly releasing them. only worth it if you like a challenge, and have the time. expect to brick the device at least once, so long as you don't blowup the bios ic and you have a dump of the bios chip, you can recover it. if you want to run linux you will need to flash coreboot on it using this project mrchromebox.tech the bios chip will need a manual flash using a ch431a with a 5v to 3.3v converter, or a ch431a modded to run at 3.3v. see this page for instructions on using the programmer https://wiki.mrchromebox.tech/Unbricking (heads up, I had some issues with the flashrom app in the manjaro repo. ended up using the other flashrom app in the repo "flashrom-starlabs" and that worked)

Message too long. Click here to view full text.

it uses nand flash, and you have to flash the bios chip with new firmware. lol (yes some older chromebooks (not this one) had hdds and msata ssds, that doesn't matter though since you'ld still have locked down firmware that can only run chromeos)
what doesn't work right about it? not sure if you can even get a shell without dev mode enabled. and enabling dev mode isn't possible unless the admins allowed it/removed from there list of owned devices. if you successfully enabled dev mode, you have everything you need.

(4.72 KB 259x194 Anon 2.jpg)

Black Hat Money Anonymous 06/15/2023 (Thu) 21:58:31 No. 12323 [Reply]
Hello 8chan, I have seen most people asking what is the best method to start with on dw to make easy illegal money. From experience I will advise you to start with PayPal logs since they are easy to cash out. It is easy money since you will be using the balance to buy btc and use local monero to exchange the coins to xmr to make it more anonymous. Am willing to share my knowledge as a sign of giving back since I was also put on game by some one else a while back and I believe that a candle does not lose any of its light by lighting up another candle. Let's fuck the system and make money together but always remember to prioritize your opsec since it's illegal.Message me on session I will easily guide you from there. You gotta have your own one time initial capital required to start. Session download link: https://getsession.org/ Session ID: 052e6ee742c7bbffdecc4781ebf34d73ee42c0a80c7ee0eb817be2501badd25249
4 posts omitted.
socks and proxy for cc
(49.89 KB 474x674 th-1305116898.jpg)

>>12323 What a fucking glowie
I would like to acquire knowledge.

(52.14 KB 508x500 1660734558866225.jpg)

/smg/ - software minimalism general Anonymous 08/18/2022 (Thu) 14:59:01 No. 9388 [Reply]
For discussing software minimalism. >What is computing minimalism? https://en.wikipedia.org/wiki/Software_bloat https://en.wikipedia.org/wiki/Unix_philosophy https://wiki.installgentoo.com/wiki/Software_minimalism >Why is software minimalism good? - Fewer bugs - Better performance - Lower memory footprint - Better maintainability - Higher scalability - Longer software lifetime - Smaller attack surface >Who hates software minimalism? - Script kiddies (Muh Kali Linux)

Message too long. Click here to view full text.

23 posts and 5 images omitted.
I'm using W10 LTSC for now.
Is Arch not considered minimal? Is it cause of systemd?
>>9388 i use tails for software minimalism. My laptop sucks less power from the batery since i use it.

Banner ad in Krita. Anonymous 10/13/2023 (Fri) 07:57:19 No. 13333 [Reply]
I just opened Krita after a long time and i got a banner ad. Does anyone know what is going on?
3 posts and 1 image omitted.
>>13445 So, no, I can't read English, nor can I use common sense, is what you meant to say htere. I get it.
>>13463 Kek, you could have been less aggressive anon. A simple "I think you know what's going on" would have been sufficiently communicative and snarky for your needs.
>>13445 I know what you mean. How far are they going to go with this sort of thing? Is the next version going to look like a 1990s geocities page? You can say "obviously they don't want to get forked for pushing too hard" and probably they'll avoid going off the deep end, but it's not like there aren't precedents of well-used FOSS becoming adware, exploitative, etc. >10/13/2023 Oh, well. I wonder how this all turned out.

(42.90 KB 400x372 HACKING TOOLS.jpg)

MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB Anonymous 10/21/2022 (Fri) 22:34:23 No. 10311 [Reply]
MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB https://archive.org/details/tools_202210
6 posts omitted.
yeah, no. i think ill just stick to installing blackarch or kali if i wanna get a shit ton of "hacking tools"
Just gonna leave this in here, thank you, maybe someone in here might decode this for me. 192.168.0.184
>>13891 You shouldn't post the IP addresses of Mossad agents.

(730.10 KB 1357x768 gnome-3-36.png)

(245.20 KB 1920x1080 2593505111628596369gol1.jpg)

(436.79 KB 1680x1050 xfce-4-18-desktop-environment.jpg)

(64.35 KB 1366x768 i3-16.webp)

Desktop Environment and Window Manager Thread Anonymous 10/13/2023 (Fri) 05:58:39 No. 13331 [Reply]
Argue about what desktop environment or window manager is cool and which one sucks. I have been using awesome window manager on my T61 for like a year, but I'm still wondering how much of a meme it is. Kind of sick of endless tweaking. Maybe I should just use Xfce on it - if I'm not used to awesome after so long, I should probably switch. On my more modern computer I use GNOME, while when GNOME3 came out I thought it sucked, I think it's matured really well and is pretty alright as a "default" kind of desktop. What do you like using, and why?
5 posts omitted.
>>13557 Yeah, I tried to install Node and it had the 12 version when the lastest is the 20. It's so fucking out of date.
I just use dwm because outside of 2 niche use cases it does every I need out of the box. I did spend some time patching some extra features but mainly it was just to have a different layout for each tag so it wouldn't be resizing every application when I changed something, as well as systray functionality for dumb applications that demand a systray to store their icon, which frankly none of the applications add any benefit to having a systray icon, I've never once had to click on the dumb things for any reason.
>>13331 For me, the only usable Desktop Environment is Xfce4 (and perhaps Mate). I use Ratpoison on my laptop and IceWM on my desktop (I have also tested LabWC). Ratpoison is manually tiling WM. It's basically Tmux but for managing GUI windows. By default all windows are maximized and you can use ctrl-t n to switch to another ("next") window or you can use ctrl+t 2 to switch to window number 2 (and so on). There is also a command for switching to a window by searching for it's title, but I forgot the keybinding... The great thing is that Ratpoison can show all keybinding with ctrl+t ? (it lists even custom ones!). ctrl+t is the default Ratpoison "prefix key". All Ratpoison commands start with the prefix key but you can change the prefix key if you want, and you can define keybindings that don't need the prefix key (like making WinLogo + r execute your program launcher). Ratpoison is very simple to use and configure but some people want that their WM manages windows in a more dynamic or automatic way. It's also extremely lightweight. IceWM is basically a clone of Windows 95 GUI with additional features (like optional support for sloppy focus). I used to use OpenBox but the development of it has stalled, unfortunately. Both OpenBox and IceWM are very simple to configure, too. LabWC is a clone of OpenBox for Wayland. >>13343 >Gnome >Haven't tried it yet, but from what I've seen looks like something for mobile or touch screens. Gnome 2 was great but Gnome 3 is basically the Windows 8 of Linux world. Avoid. Mate desktop environment is a clone of Gnome 2. >>13557 You should try Debian testing.

Message too long. Click here to view full text.


There is no such thing as Ukrainian hackers. Anonymous 05/12/2022 (Thu) 18:39:37 No. 8419 [Reply]
There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks
20 posts and 4 images omitted.
>>8419 you'll never be a woman btw
while i doubt its really true, mainly the "crypto Jews".. lol
you can smell the schizophrenia in this thread

(1.15 MB 750x715 image0.png)

Bypassing bot detection on betting sites Anonymous 12/19/2022 (Mon) 00:39:14 No. 11041 [Reply]
Sup /t/, I dont really frequent chans so apologies in advance if I'm not following the proper etiquette. I'm trying to set up a script which does arbitrage across sportsbooks if it identifies a big enough spread in the odds. While this part isn't so difficult, the real issue is that apparently most sportsbooks will ban you if they catch you doing arbitrage. Is there a way which I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Do I even need to worry about this? If anyone has any tips/ experience that would be great. tl;dr how do i not get banned off of sportsbetting sites for botting
6 posts omitted.
>>11059 Why do you care what random retards on a traditional Austrian painting forum think is "Jewish"? Are you a {{{goy}}}?
(73.12 KB 1280x720 maxresdefault.jpg)

>>11041 >I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Maybe with userscripts, but it depends a lot on the site and what you mean by "close enough to how a human would". >>12836 >do you guys think it is real? Not quite, the original image is this and apparently it comes from https://www.youtube.com/watch?v=V1nBJKtSs4E
>>11051 >>11059 >>12863 to be fair: "jewish" has also remained a racial thing on top of the nominal religious thing it's why jews are racist in israel

[ 123456789101112131415161718192021 ]
Forms
Delete
Report