thumbnail of D10F8532-1A78-436D-A596-F7B98B09E8EA.png
thumbnail of D10F8532-1A78-436D-A596-F7B98B09E8EA.png
D10F8532-1A78-436D-A5... png
(929.32 KB, 1500x1200)
thumbnail of FCFEA343-79F6-478A-BDF6-F42646F48A0B.jpeg
thumbnail of FCFEA343-79F6-478A-BDF6-F42646F48A0B.jpeg
FCFEA343-79F6-47... jpeg
(370.15 KB, 737x896)
^In the past (+in ~this month), and as noted in this general, I've seen Wayback Machine use "dirty connections". A dirty connection is one which is MITM'd. It could be man-in-the-middle'd by being blocked or by having ads injected into it by the ISP or maleware (or some false redirect or something). But HTTPS is encrypted, so how can this happen? Server Name Indication (SNI). If you load a web page or file and record that networking data by using Wireshark, then you will see the domain name (and maybe also the subdomain) in cleartext. Apparently there's a spec to hide SNIs: Encrypted Client Hello (ECH). Unfortunately, ECH is still in development or it isn't widely-adopted yet. Anyways, today I saw archive.today use a dirty connection; this webpage was originally a "website blocked" page:
https://archive.is/20240907211614/https://gateway.ipfs.io/ipfs/QmW5ZAf5p9a8EtvjVWo2obyP2cWmK6kMXNnDxo2rqntEqp

QmW5...tEqp:
. That 2024-09-07 21:16:14 capture previously looked quite similar to this: https://web.archive.org/web/20240907225505/http://82.223.97.47/ (screenshot of that at https://gyo.tc/ci/123/0/991/1000/1daEQ is attached)
. folder contents: Applejack's time with Cherry Jubilee, source code of tint-tetris, a sexy music video, one or two other things

and the URL was something like http://82.223.97.47/blocked?url=gateway.ipfs.io (probably not this, but similar to this - just going on memory). I have neither the exact URL nor a capture of that archive.ph capture. I don't have it because I didn't get a chance to get it before archive.is fixed it. If archive.today captures an errored page or file, then sometimes it will later fix that. So if it gets an HTTP error (not HTTP 200 or a redirect), it might try that URL again until it gets an OK code. For an example of this, see  >>/10794/ - I was able to download that screenshot before it got orphaned (might get deleted in the future).

----\\ 2018 video not in TPA - "Return of Evil - Deja Vu PMV":
https://invidious.yourdevice.ch/watch?v=2huX15XooWY
. 720p local dl=done, more=todo
. small channel, MLP focus
. some video are "redirects", such as https://invidious.reallyaweso.me/watch?v=NZZ1fw9El24 = links to https://drive.google.com/drive/u/1/folders/1pmZtSFjF3I8eHg3eNzt4oKF2Xjjlah8y which isn't another deleted "cloud storage" thing yet. Should really call it "corpo data center storage where the data is not-so-accessible".

 >>/10921/
Captured: https://archive.ph/20240905225143/https://web.archive.org/web/2/https://www.tennessean.com . Image: Lubuntu 14 CD got rekt ( https://desuarchive.org/g/thread/102259591/#102267646 ), so maybe I'll use a liveboot of BSD.