Jump to content

All Activity

This stream auto-updates

  1. Past hour
  2. EXTREMELY SURPRISING (at least to me)! I *can* log into my water sewage billpay in Iron v109! No Cloudflare BS. I may have to see if all of my other "needed" web sites are okay with v109.
  3. Interesting. The only Cloudflare captcha I'm ever hit with is my water sewage billpay web site. First encountered last November and the only fix was to upgrade Chrome from v136 to v140. I was hit with it again just a couple of weeks ago and the only fix was to upgrade from Chrome v136 to v138 (but I ended up landing on v144 due to other nuances). I cannot list the URL because it reveals the city that I live in. That one web site is my only Cloudflare headache. Excluding VM browsers (primarily Roytam releases) which get hit with Cloudflare, clears itself in 24 hours, then gets hit again, but clears itself in 24 hours.
  4. My primary system for general browsing is still on Windows 7, so that may not be correct. The three browsers I am running surely cannot be anywhere close to being modern by this point: Iron 109.0.5550.0 Chrome 109.0.5414.120 Firefox 115.32.0esr (this one actually does still update actually)
  5. Today
  6. Of course it is! They are different sessions, different cookies. I'm failing to understand the obsession. I'm done here, I really do not need the obsession.
  7. It's different on the same (your) screengrab, upper left image.
  8. Redirect link and tracking link are two different matters. The garbage you see after = is a unique tracking stamp. Most likely contains your IP, PC specs obtained via GetOEMCP ans so on. https://learn.microsoft.com/en-us/windows/win32/api/winnls/nf-winnls-getoemcp
  9. The tracker will be different with each browsing session. Google is tracking your searches, not your browser. I never said that the tracker will be "identical". It is generated BY GOOGLE each and every first visit per COOKIE. Delete the cookie and you get a new "tracker". First cookie: Delete first cookie, let Google set second cookie:
  10. In NM the redirect link appears only after clicking on the link (or copying). Of course the HTML is different coming from the server, the anchor element contains different parameters. I am sending a Firefox/140 agent to get the full page from Google instead of a simplified version. It was a surprise to me that the page still isn't completely full doing this. I don't think is needed to jump in and "defend" either browser.
  11. Where are these OpenSSL DLLs usable in apart from a YouTube downloader? Legacy applications that I have all depend on libeay32 and ssleay32. And do they support new algorithms to justify their much bigger size?
  12. Joined you favourite upvoter Karla and gave you the much desired likes. Nevertheless, the link above is generated by the browser. It differs from the link below, on your screen.
  13. I don't think that it is regional advertising causing that error. I get that error in most recent B/S 52, B/S 55, and PM/NM 28. Only one of the three (brand new profiles, first run on all three) gave a geolocation warning (which was denied), but I forget which one of the three. I have to assume that the other two simply allowed the location-reveal, but I did not verify.
  14. For example, regional advertisement, but i don't see anything.
  15. Don't know what the problem is then unless it's regional because even with a brand new profile and no addons I get that error. If you go to directly to this link using 55 basilisk I get an error after 3 to 5 seconds: https://weather.com/weather/today/l/20398:4:US So we'll see if anyone else is experiencing it, my luck it;s just me. :--)
  16. Many thanks for your follow-up , which actually sets the record straight ; and thanks for the re-upload ! Best regards.
  17. Yesterday
  18. You're right. I take it back what I said earlier. I have actually changed the build_openssl3() function locally to automate the process of creating the shared- as well as the static-release. And in the process I forgot to strip both dlls. The filesizes are now identical to what you ended up with. I re-uploaded 'openssl-3.6.1-win32-shared-dev-xpmod-sse.7z'.
  19. Found this - https://www.topendsports.com/sport/betting-tools/spread-calculator.htm This answers most of my curiousity. A local team has been VASTLY OVER-RATED and (admittedly) it has become FUN ENTERTAINMENT to watch them NOT live up to that over-rated hype! Sure, it's nice that they've been WINNING, but they have NOT been winning by the double-digit margins of the "betting lines". On a "standard VIG" [ie, -110] (no clue what that is, kind of doesn't matter for sake of example), we can "back-date" FIVE wins by this team but FOUR of those wins DID NOT BEAT THE SPREAD. Game 1 >>> spread of -18.5 (ie, if they don't win by 19 points or more, then they lose in terms of the bet) Game 2 >>> spread of -16.5 Game 3 >>> spread of -8.5 Game 4 >>> spread of -14.5 Game 5 >>> spread of -12.5 The team won all five of these games, but did NOT cover the spread of games 1, 2, 4, and 5. My FUN ENTERTAINMENT was "gentleman's bets" with a coworker. For "bragging rights". My "working theory" to my coworker was that our local team would NOT cover DOUBLE-DIGIT SPREADS. So we were technically "betting, but no money, just bragging rights", on only games 1, 2, 4, and 5. I *won* but she now mocks me for there being no "money" on the line. So if the VIG is always -110 "standard", the spread calculator link posted above would have paid out in this manner if $100 was bet on game 1, the winnings then bet on game 2, the winnings then bet on game 4, then the winnings bet on game 5. Game 1 >>> $100 bet, payout would have been $190.91 Game 2 >>> $190.91 bet, payout would have been $364.56 Game 4 >>> $364.56 bet, payout would have been $695.98 Game 5 >>> $695.98 bet, payout would have been $1,328.69
  20. Ah, I see. Then I'm good to go on my main system with my own self-compiled OpenSSL libraries used by Python. These are nowhere to be found on the web.
  21. Yep! I remind my brother of that ALL THE TIME. He's big into lottery tickets, swears up and down he wins more than he loses but I can't get him to SPREADSHEET IT for PROOF. Because I keep telling him "that's how the game is played". Make you FEEL LIKE you are winning so that you keep buying.
  22. FWIW, I don't believe that the slproweb distributed binaries have been optimised to load on SSE-only CPUs (I don't have the ability to test this hypothesis, though ), which is the case with Reino's DLLs. Personally, I prefer his for TLS-fingerprinting reasons... During recent months, many popular web services have been put behind aggressive anti-bot/anti-AI filters run by Cloudflare ; these filters treat web requests by yt-dlp as originating from a non-browser client (this is true, of course ) and block them "with prejudice" . On supported platforms (Windows 64-bit >= Win7), these blocks can be mitigated (not always successfully) by using the optional curl_cffi yt-dlp dependency and the associated "--impersonate" cmdline flag; but on 32-bit, especially when < Win7, this method can't be used ... One has to try other means of modifying yt-dlp's web requests, so as for them to have TLS fingerprints slightly different from the values inside CF's blocklists; in some cases, the use of the "--legacy-server-connect" flag might be enough, but usually it's not... Another method is to load the web service in a sanctioned browser, then extract session cookies and pass them to yt-dlp, along with the exact --user-agent the cookies came from; doesn't always work. If you are in a position to update the OpenSSL version bundled with the CPython installation used to launch yt-dlp with, then you have best hopes of beating CF's block (because their blocklists contain values generated from "stock" CPython versions, containing whatever "default" OpenSSL version assigned by PSF; usually one of the 3.0.x LTS branch). It's under the above scenario that Reino's DLLs can prove most helpful, because a) with their "special" configuration, they generate TLS-fingerprints deviating (in a good way) from a standard/mainline OpenSSL binary (like the ones from slproweb/overbyte) b) the link to them is less "prominent" in the web, so less prone to be found by CF personnel/bots and their TLS-fingerprints added inside an anti-bot filter; I have found these DLLs to be quite successful in "tough" cases, like the "dailymotion.com" one; so, many thanks Reino for those ... Best regards.
  23. Respectfully, this doesn't add up at all with my findings, which should be possible to reproduce by others (and why would I publicly post untruths in the first place? ) ... I'm always talking about the 3.6.1 (32-bit) DLLs contained in the following archive: https://rwijnsma.home.xs4all.nl/files/openssl/openssl-3.6.1-win32-shared-dev-xpmod-sse.7z As I've posted previously in this thread, I keep a 2017-era copy of MABS (media-autobuild-suite) and if the DLLs had indeed been stripped, then submitting them to a "second" strip-treatment wouldn't result in filesize reduction; however, as I've posted already, I noticed that: Proof from an actual mintty window: OTOH, your static openssl.exe (32-bit) binary contained inside archive https://rwijnsma.home.xs4all.nl/files/openssl/openssl-3.6.1-win32-static-dev-xpmod-sse.7z is indeed a "stripped" binary, because: Regards.
  24. Someone once told me to the effect of "gambling is a poor mans dream"
  25. Generally speaking, you should never get a Cloudflare captcha on any MODERN web browser that UPDATES ITSELF every few weeks. The problem is for those that prefer to NOT run these auto-updates. All it takes is a browser that is THREE OR FOUR versions "old" to TRIGGER the Cloudflare captchas. I've never witnessed anything but a checkbox that checks itself, zero user interaction, when at work (where the IT dept forces me to reboot my laptop 25 times in any given 30 day month all in the guise of "updates" for this or that).
  26. Yeah, I actually have come to hate hate HATE sports! I *literally* NEVER watch anymore (but scroll scores via web browser instead). It was different when I was a kid, but nowadays, every commercial break is sponsored by a GAMBLING COMPANY with tiny fine print at the bottom for those with "gambling addictions". Then there are things like https://www.nbcnewyork.com/news/sports/list-players-coaches-sports-betting-gambling-allegations/6408736/ And this https://www.cnn.com/2024/06/15/sport/sports-betting-gambling-professional-athletes-dg You can't even watch "news" programs that are supposed to cover "sports" without them also covering GAMBLING and be SPONSORED by GAMBLING COMPANIES. I'm waiting for these to become ILLEGAL ADVERTISING (like cigarette commercials, not technically "illegal", but so HEAVILY regulated that no manufacturer bothers to "advertise").
  27. No, this makes things difficult for a server admin. Another site I admin on can often see bot swarms at levels that exhaust server resources (database specifically) and will make the site slow. So I've had to pull the access.log a couple of times and run it through an analyzer tool to find out just how these bots appear. The "good" ones, bots operated by legitimate (although some people may disagree) corporations, have user agents or other identifying information that they send along with their HTTP GET requests. These are bots like search engine spiders and AIs. The Western world bots from Microsoft, Amazon, XAI, etc are all identifyable and more importantly do not tend to bombard sites likely because a lot of information is already cached in datacenters. The corporate bots from SEA have user agents but tend to send way too many requests. The issue is tied between the SEA AI bots and the "unknown" variety that can be determined to be from an AI or LLM setup *somewhere* but they send no information along to the web server. So when 6,000 bots decide to hit the server at some point, 5% are legit western origin, 45% are legit eastern origin and the rest are the unidentified. Of course, many of the unidentified are not actual mysteries, but you can't determine that just from the logs. You'd have to research IP addresses, ports, GET strings, etc and it can be figured out. But this takes an incredible amount of time to not only research, keep up to date and set block/control lists on the server that using a go-between that already has most of this information tracked is very compelling. Especially since Cloudflare has a free option that many sites can use, this is likely why you end up seeing it used so much. All Cloudflare is, basically a software firewall that sits between a website and the user. Cloudflare shows different things to different browsers, browser settings (js enabled or not, etc) and based on perceived country or region of origin. There is also likely a difference between their free and paid version. I personally have not see any sort of captcha from Cloudflare in a long time, I only get a checkbox to prove I'm human.
  28. I don't understand gambling much either. Just for fun I put your question into Gemini and this is an excerpt of what it responded.
  1. Load more activity
×
×
  • Create New...