This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512- ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/
beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015"
integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
On 11/13/2025 3:12 AM, Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/
beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015"
integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my
experiment is broken by default?
those Cloudflare bastards! How many other sites got injected against
their will?
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512- ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/
vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
No problem, because nobody is using your cipher for serious tasks. Efye
Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/
vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
No problem, because nobody is using your cipher for serious tasks. Efye
On 11/13/2025 4:18 AM, Radio Eriwan wrote:
Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/ >>>> vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-
beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
No problem, because nobody is using your cipher for serious tasks. Efye
My online violates my rules anyway. I need it to use a TRNG! Its a good symmetric cipher.
I only use them for HTTPS. Those little shits!
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Whether they should do so is a different argument.
On 11/14/2025 6:24 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Indeed. They must proxy it through them...
Whether they should do so is a different argument.
Yeah, no shit Rich! I wonder if they do this to many others as well. Oh Well... ;^o
Its my fault for using a free HTTPS. Actually, I did not expect them to inject cloudflare shit into my code: Sigh.
My online thing was just meant as a quick and dirty impl to show my HMAC cipher online. Basically, so people can play around with it without
having to compile anything. It was never meant for a real service. But still, damn. cloudflare bastards! Argh!
Shit happens.
Actually, is there a way to get a real TRNG using javascript anyway?
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Whether they should do so is a different argument.
Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/
vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
No problem, because nobody is using your cipher for serious tasks. Efye
On 11/14/2025 6:24 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Indeed. They must proxy it through them...
Whether they should do so is a different argument.
Yeah, no shit Rich! I wonder if they do this to many others as well. Oh Well... ;^o
Its my fault for using a free HTTPS. Actually, I did not expect them to inject cloudflare shit into my code: Sigh.
On 11/18/2025 3:34 PM, Chris M. Thomasson wrote:
On 11/14/2025 6:24 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Indeed. They must proxy it through them...
Whether they should do so is a different argument.
Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
Well... ;^o
Its my fault for using a free HTTPS. Actually, I did not expect them to
inject cloudflare shit into my code: Sigh.
My online thing was just meant as a quick and dirty impl to show my HMAC
cipher online. Basically, so people can play around with it without
having to compile anything. It was never meant for a real service. But
still, damn. cloudflare bastards! Argh!
Shit happens.
Actually, is there a way to get a real TRNG using javascript anyway?
This free service can inject anything it wants, and shall record all
traffic to and traffic after our proxy wrt our free HTTPS.
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 11/18/2025 3:34 PM, Chris M. Thomasson wrote:
On 11/14/2025 6:24 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Indeed. They must proxy it through them...
Whether they should do so is a different argument.
Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
Well... ;^o
Its my fault for using a free HTTPS. Actually, I did not expect them to
inject cloudflare shit into my code: Sigh.
My online thing was just meant as a quick and dirty impl to show my HMAC >>> cipher online. Basically, so people can play around with it without
having to compile anything. It was never meant for a real service. But
still, damn. cloudflare bastards! Argh!
Shit happens.
Actually, is there a way to get a real TRNG using javascript anyway?
This free service can inject anything it wants, and shall record all
traffic to and traffic after our proxy wrt our free HTTPS.
That is a universal truth for all proxies where you the original sender
are not encrypting the data before sending it to the proxy.
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 11/14/2025 6:24 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
I only use them for HTTPS. Those little shits!
Meaning your connection to them is http -- if so then yes, they /can/
insert anything, and modify anything.
Indeed. They must proxy it through them...
Whether they should do so is a different argument.
Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
Well... ;^o
Its my fault for using a free HTTPS. Actually, I did not expect them to
inject cloudflare shit into my code: Sigh.
https://en.wikipedia.org/wiki/Let's_Encrypt
Free SSL certs -- you do need to configure your webserver to use them
(and setup auto-renew, which this is useful for
https://dehydrated.io/).
Chris M. Thomasson wrote:
On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
This cloudflare crap in my code that I did not write seems scary:
They inject it on the fly?
view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
WTF!?!?
<script defer src="https://static.cloudflareinsights.com/beacon.min.js/
vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
crossorigin="anonymous"></script>
</body>
</html>
I only use them for HTTPS. Those little shits!
Here is my test page for my test cipher:
https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/
Fucking cloudflare!
But, that script can record plaintext before its encrypted?
If that injected script, Eve can see the secret key, then my experiment
is broken by default?
No problem, because nobody is using your cipher for serious tasks. Efye
Fwiw, here is an older C impl I created:
(when you get some time, read all) https://groups.google.com/g/comp.lang.c/c/a53VxN8cwkY/m/WIxIwoK7DAAJ
https://pastebin.com/raw/feUnA3kP
(raw text, no pastebin add infested garbage)
Well, fire up a C compiler. ;^)
Chris M. Thomasson once wrote:
Fwiw, here is an older C impl I created:
(when you get some time, read all)
https://groups.google.com/g/comp.lang.c/c/a53VxN8cwkY/m/WIxIwoK7DAAJ
https://pastebin.com/raw/feUnA3kP
(raw text, no pastebin add infested garbage)
Well, fire up a C compiler. ;^)
Why should someone fire up a C compiler,
and read GG, when all modern
people use Go or Rust, for security/privacy/anonymity related tasks?
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 54 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 14:03:49 |
| Calls: | 742 |
| Files: | 1,218 |
| D/L today: |
3 files (2,681K bytes) |
| Messages: | 183,733 |
| Posted today: | 1 |