Posted by smartypants in ramble (edited )


This site main server is DOXXABLE IP location because of EXPLOITABLE FEATURE (auto fill of news links pasted when creating a new post topic, a feature used to TAKE DOWN the million member site, as per the doxxers manifesto himself online). His boasting prior to antifa goons and fed raids on :

i put on catbox for anonymity, he doxxes and logs visitors to that original boast i paste here :

Gab icon fetch exploited by leftist doxxers :

he gloats a similar tactic by his leftist anti free speech pal "kubeworm" for Image Proxy (icons next to posted news links) was used to doxx the server IP f gab ( when gab fetched an image to iconify.

note: he is not a good hacker, ARIN is not a guarantee of ip range assignment and only 92% accurate in all my past tests. Server was in canada though this time , via traceroute to it , not the anti-DDOS it used as a service to hide.

How canadian? Very. The used canada to avoid US FBI raids. : from a traceroute to shows ARIN is accurate for him that time :

 8 ( (  9 ( ( 10 ( 11 ( 12 ( 13 * * * ) 14 ( ( 15 ( 16 ( 

I usually only ARIN the two IPs ABOVE the traceroute ARP-able landing point.

That Leftist kike posted a related doxxing post thread , i put on catbox here, going after violators of Furry con suit IP :

That link discusses outing machines hiding behind services such as cloudflare and other anti-ddos services like :

BitMitigate Digital ocean Imperva Incapsula Dynu Dynamic DNS Neustar SiteProtect JavaPipe ArvanCloud CloudLayar 

as shown in that second link ...

EMAIL for lost password is second vector

EMAIL is that doxxing leftist's main tool for free speech sites, as per this other post of his :

Sites using EMAIL to reset passwords can be doxxed using effort, but DISABLED email traffic from that route for leftist hackers to learn the email server origin and owner of box. But the hacker used a POST SUBMISSION with adornment to determine the IP of the main site when it fetched a post title suggestion! Then was immediately taken down a day after doxxing, when democrats showed up at home of domain name holder , and attacked the canadian server colocation too as hinted at by doxxer.

I would doxx the doxxer but free speech sites should not host doxxing, because of JOE JOBS :

That joe job wiki page is too specific... a joe job is making people THINK one persona is another persona, and its not email, I invented it for usenet and used it to get into multiple national news magasines in the infacy of internet. i started it before usenet on America OnLine in fact, to hilarious result.

THAT possibility of a "joe job" is why doxxing should never be hosted on a free speech web site.


Though I now have some suspicions as to how Kosher this sites admins may be, its important when is moved from a 2 dollar a month VPS to a real free speech colocation spot will need to prevent doxxing then, and in mean time , ramble needs to ...


1 > STOP AUTOFILL of posted link title selections (simple one line mod fix) or else tunnel it through a SEPARATE non doxxable machine far far removed from as a trampoline fetch back and forth

Disable, or PUT ICON INITIAL FETCH on 4 hour random delay

2> Disable icon graphics fetch.... Or else tunnel it through a SEPARATE non doxxable machine far far removed from as a trampoline fetch. A URL to an icon image is legally allowed to have URL adornments like "?embed=yesq2323r45" on it and such so icon fetch is not safe even if hid in 4 hours of access chatter if the URL posted to was "salted".

no emails

3> Never use emails for anything ever

Even if the admin possibly feels safe from being accused of antisemitic feelings because of personal reasons, the HOSTED CONTENT of a free speech site merely mentioning honest facts on Jews by participants, is a target of leftists for total destruction and "unpersonning" 1984 style. Job, bank accounts, prior merit awards years ago taken, apartment rental cancelled at term end, etc etc.


I realize its not your fault if you are using a stable checkout of , but its important to avoid those three doxxing exploits



You must log in or register to comment.

Rambler wrote

The clearnet IP of the server isn't hidden and the hosting provider is well aware of the site and supportive of free speech.

The anonymity features are to protect the users, not me.

And the email reset has never worked, I've never enabled it. I need to remove mentions of it from the code.

I'll review this in more detail when not on mobile.


boobs wrote

ramble's servers are not supposed to have anonymity as i understand it.