Message from @porco
Discord ID: 448463154415009792
how much you are willing to invest birdo
0.000004 bitcoin
actually I'm just really curious if being an owner of a porn site is profitable <:alismirk:230784726615588865>
I didn't think about money yet
until now I've put about 350 $ into the project in software licenses and server costs
my budget is roughly 1k to get it live
then I will think about some way to cover the costs
awesome
initiate user tracking and ad spamm
:D
ofc prenium accounts for higher than 240p content
kek
see if you can make some sort of history feature, like say an account so you can see the video links you've clicked on/watched
if that isn't too expensive
porcorossos brain "1 more setting tab for gdpr" just about now
http://185.10.68.34:5123/
I have indexed 300k videos over night
feel free to stress test the shit out of it
bugs of yesterday are mostly still there though
Also user accounts are off the table for now
first thing i see https://lambda.sx/jy3.png
also oh no... now porcorosso has my proxy ip
<wath me care>
log are seriosly `>/dev/null`
null logs best logs
I don't see your IP, only what is called and only if it generates an Exception
and even then, without IP or user related data
```MySql.Data.MySqlClient.MySqlException (0x80004005): Fatal error encountered during command execution. ---> MySql.Data.MySqlClient.MySqlException (0x80004005): Fatal error encountered attempting to read the resultset. ---> MySql.Data.MySqlClient.MySqlException (0x80004005): Reading from the stream has failed. ---> System.IO.IOException: Unable to read data from the transport connection: Connection timed out```
For example someone just managed to let MySQL timeout
But I don't see the IP, only what was called
needs more https tho
yeah as soon as I route the domain
I will use a Let's Encrypt cert
do you sanitize your inputs good sir.. or do i need to test it
(dont worry i wont
http://185.10.68.34:5123/Home/Search?term=%27%3B+SELECT+*+FROM+Videos&orientation=1
it should be sanitized since nothing that you type goes straight to the database
But I appreciate if you find an injection
http://185.10.68.34:5123/Home/Search?term=%3Cscript%3Ealert%28%22xss%22%29%3Cscript%3E&orientation=1
did not do any intrusive stuff . just basics.. http headers for X-xss / x-frame /x-content are not set a (XSS attacks and clickjacking