about summary refs log tree commit diff stats
Commit message (Collapse)AuthorAgeFilesLines
* Updated verbly & libtwitter++ to remove dependence on json submoduleKelly Rauchenberger2016-11-272-0/+0
|
* Updated verbly to 6c2aca0Kelly Rauchenberger2016-11-271-0/+0
|
* Fixed makefile errorKelly Rauchenberger2016-09-122-2/+2
| | | | Also updated libtwitter++
* Removed unused copy of curlcpp dependencyKelly Rauchenberger2016-09-122-3/+0
|
* Updated libtwitter++ (new API, and fixing a curlcpp crash)Kelly Rauchenberger2016-09-122-161/+152
| | | | Also changed to use C++ APIs for randomization and sleeping.
* Updated verblyKelly Rauchenberger2016-04-181-0/+0
|
* Blacklisted an image server known to return bad imagesKelly Rauchenberger2016-04-181-74/+53
|
* Merge branch 'master' of https://github.com/hatkirby/differenceKelly Rauchenberger2016-04-161-0/+9
|\
| * Added Accept header to image requestsKelly Rauchenberger2016-04-161-0/+9
| | | | | | | | | | | | The canonical bot tweeted an image (https://twitter.com/differencebot/status/721395886291558400) containing an advertisement instead of the requisite object. Previously, the only defense against servers serving the wrong image was that we ignore 300 response codes. This image, when loaded in Google Chrome, loaded a document with a content type of text/html, which is also ignored by difference, and which executed JavaScript redirecting Chrome to a malware-infested page. difference, however, saw the response as an image with content type image/gif (notably different from the URL, which indicated a JPEG image). It turned out that Chrome was using an Accept header that prioritized text/html documents over most other content types, which the malicious server used to decide what content to serve. Changing difference to send the same header caused the malicious server to also serve the text/html document to difference, which difference then discarded. Whilst the Accept header being used now does prioritize text/html documents over images, servers with legitimate content will not use that information when deciding what document to serve. The malicious test URL is http://www.northvalleymedicalsupply.com/shop/products_pictures/adj%20hinge%20knee%20brace.jpg.
* | Tweaked image generationKelly Rauchenberger2016-04-161-2/+3
|/
* Updated libtwittercppKelly Rauchenberger2016-04-151-0/+0
|
* Added yaml-cpp submoduleKelly Rauchenberger2016-04-154-3/+6
|
* Initial commitKelly Rauchenberger2016-04-157-0/+381