Now that I went through the hell of turning an example Android app to a library, I now get to go through the hell of figuring out how Android studio uses aar files now, and then the hell of figuring out how chromium's Android build system to figure out how to pull an asset out of the AAR into somewhere the Java side can read
Because I just deployed a new version of iocaine, I figured I'll look into how the cookie monster guard is working out.
Filtering out my own requests, there were a total of 617 requests made towards my forge that the monster did not eat (out of about 78k my passive identification didn't route into the maze).
Those 617 requests came from 194 unique ips, and 28 unique user agents, and hit 164 unique URIs, most of which are CSS, JS, and various images.
I do see.... a number of suspicious URIs hit, though! Stuff like /archive/HumpY/pulls?assignee=1&labels=389,388&milestone=0&poster=0&project=0&q=&sort=&state=open&type=all. That is very likely not a human.
Looks like we have a JS-capable bot! Lets dig in.
Here’s a fun SVG trick I just learned. If you set the fill or stroke properties to currentColor using CSS, your SVG will be the color of the text around it.
This is great for auto-changing light and dark modes because it means you don’t need multiple images – the SVG will just change color appropriately.
Click on the permalink for this note for a demo :D
Permalink: https://www.ragman.net/notes/24
#coding, #webdev
Thinkin of getting a "travel phone" for my trip next month. Anybody have suggestions for #eink phones that don't suck? I just need it to take a SIM and be able to set up wifi hotspots.
Occult Enby that's making local-first software with peer to peer protocols, mesh networks, and the web.
Exploring what a local-first cyberspace might look like in my spare time.