â„–12907[Quote]
First Pic:
Every single time you load a page on the sharty it scans for open ports specifically ports: 6463, 1700, and 1701
To even lurk the sharty you MUST enable canvassing in your browser% and enable JavaScript
The following JS runs in the background at all times: googlesyndication, TuxlerVPN, and Soyjak.st
Soyjak.st is what bootstraps to the hidden integrity.wasm which is the WebAssembly payload which runs extremely aggressive (the most aggressive I have ever seen) fingerprinting of your browser, ip address, screen size, OS, and every other piece of information it can possibly collect on you.
It is NOT POSSIBLE to post while in private browser mode using a VPN
The only way to use TOR is to generate an IP Token which defeats the entire purpose of using TOR.
Second Pic:
The use of eval() to execute a decrypted string as JavaScript is a significant security risk. eval() can run arbitrary code, which could include malicious scripts (e.g., stealing user data, injecting malware, or performing unauthorized actions in the browser).
The decryption step (body[i] ^= eval_key[i]) suggests the message content is obfuscated, which is a common technique used in malicious software to hide harmful payloads.
integrity can be abused to send a WebSocket message containing malicious JavaScript, which would then be executed in the user's browser.
Potential threat vectors include: data theft, session hijacking, and other severe security risks.
â„–12918[Quote]
move to tech
â„–12969[Quote]
>>12907 (OP)Don't think browser JS allows you to fetch data from other sites no? regardless of WASM
â„–13062[Quote]
Do we even know who runs this site?