Anonymous ID: bf2b37 June 27, 2022, 9:30 p.m. No.16542756   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2775 >>2792 >>2925 >>2985 >>3149 >>3182 >>3183 >>3230 >>3305 >>3309 >>3316

Why does a Tor post show an ID on mouse-over?

 

Anons are still asking this question and nobody has provided an answer yet. I guess you dweebs are not very good at sleuthing out a tech question when you can't just ask Google. Not meaning to demean the anons but there does seem to be a dearth of tech expertise on this board. Anyway, enough of that.

 

Two things can happen when you mouse over a post number. If the post is in the same bread then the data is already in memory so the post can be shown right away. If the post is from a different bread then the data is NOT already present so it has to be retrieved somehow. This is done by fetching the JSON format for the bread in question because this loads much faster than the HTML and doesn't require a lot of complicated parsing to extract the post info from the data stream.

 

You can verify this by opening the network monitor tool in your web browser. Mouse over one of Q's posts at the top of the bread and see what gets loaded in. For Q's first post, this url will appear:

 

https://8kun.top/qresearch/res/16504556.json

 

You can load that link right now in your browser and get a nicely formatted data structure. Click on the arrows to open the top item if it is not already open. Go to item #365 and open that. See that the data point called "id" does NOT show "000000".

 

The HTML page format has the ID zeroed out but not the JSON. I don't know where the ID actually comes from. Perhaps it is the bread salt which is used to mask the ID so that it is not the same for every bread.

Anonymous ID: bf2b37 June 27, 2022, 9:43 p.m. No.16542815   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2828

>>16542792

>but we ARE all grateful to have ITanons around to answer our stoopit questions

I prefer to call myself a coderfag. Covers more ground because ITanon implies expertise in networking and stuff like that. My background is coding, not systems maintenance.

Anonymous ID: bf2b37 June 27, 2022, 9:56 p.m. No.16542887   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2917

>>16542857

>Our existing infrastructure isnโ€™t built to withstand climate change

Just how dumb is that statement? It is so dumb, so very dumb.

Rail tracks sit around in the hot sun all day and we don't expect them to get really hot? Was the air temperature 140 degrees? If it were, everybody would be DEAD!

Anonymous ID: bf2b37 June 27, 2022, 10:06 p.m. No.16542942   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2996

>>16542925

What do I think of the possibility that Q's trip could have been hardcoded into the server config?

This assumes that CodeMonkey did not remove that little hack. If he did indeed "harden" the code then that would be a massive oversight if it wasn't removed and, further, steps taken to prevent ANYONE, including the site admin, from manipulating the tripcodes.

My two cents since I know that I would not leave a hack like that in place.

Anonymous ID: bf2b37 June 27, 2022, 10:23 p.m. No.16543013   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3047

>>16542985

> if they're only masking it in the bread but aren't masking it on hover, that would explain the difference.

The masking is done by the server before the HTML is sent to the user. The HTML is derived from some sort of master file. There is no masking step when the JSON is derived.

Anonymous ID: bf2b37 June 27, 2022, 10:37 p.m. No.16543077   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3103 >>3143

>>16543047

> instead the post does have a unique ID - it just appears to be hidden

No. The HTML contains "000000". The server does the masking before sending the HTML. I am saying that the masking step is being omitted for the JSON format. Both formats are derived from a master source which contains a flag to indicate that the post originated from Tor. This flag is NOT present in either the HTML or the JSON format.

Anonymous ID: bf2b37 June 27, 2022, 10:47 p.m. No.16543117   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3137

>>16543103

>how does that flag get attached to a TOR poster?

Obviously, the server knows that the post came through Tor. It sets a flag in its master data file to indicate that. We don't have access to the master file. We just see the HTML or JSON that is derived from it.

Anonymous ID: bf2b37 June 27, 2022, 11:10 p.m. No.16543184   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3200 >>3205

>>16543173

>Would be rude to just hangup when you've got God on the line.

If I had God on the line, my first question would be: If faster-than-light travel possible? If so, then how?

That's it. That's all I want to know. That question has been burning a hole in my brain for decades.

Anonymous ID: bf2b37 June 27, 2022, 11:23 p.m. No.16543208   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3212

>>16543203

>Are you running the Tor application directly (ie /etc/init.d/tor) along with a standalone browser set up to use a socks 5t proxy on port 9050?

Good guess but not quite. My own code running through a Tor client. I set it up to post via Tor but receive the bread via clearnet. That is, "sys.8kun.top" via the onion link and "8kun.top" via clearnet. Faster that way but the posting sometimes works well for a while and then craps out.

Anonymous ID: bf2b37 June 27, 2022, 11:38 p.m. No.16543250   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>16543239

>uptime of 105 days and counting

I've had it up for over a week and had no issues on my PC. It co-exists nicely. I've tried IPFS and Freent and those things are fucking dogs. They suck up CPU and crash the router.