ryoblog/src/blog/joshwhotv-yet-another-fake-.../index.md

66 行
3.3 KiB
Markdown
Raw 通常表示 履歴

2022-06-18 22:03:33 +09:00
title: joshwhotv.com is yet another fake alternative to JewTube
author: 寮
date: 2022-04-21 09:34:28
tags: blog,technology,politics
----
Max Igan followers are now praising https://www.joshwhotv.com/.
Let's take a look at the technical part:
```
whois joshwhotv.com
Domain Name: JOSHWHOTV.COM
Registry Domain ID: 2355609353_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.google.com
Registrar URL: http://domains.google.com
Updated Date: 2022-01-11T21:48:35Z
Creation Date: 2019-01-26T00:25:02Z
Registry Expiry Date: 2023-01-26T00:25:02Z
Registrar: Google LLC
Registrar IANA ID: 895
Registrar Abuse Contact Email: registrar-abuse@google.com
Registrar Abuse Contact Phone: +1.8772376466
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: JACK.NS.CLOUDFLARE.COM
Name Server: LADY.NS.CLOUDFLARE.COM
DNSSEC: signedDelegation
DNSSEC DS Data: 2371 13 2 973B29EA87DE6A3C6943D15783CD2083F61DEBB68FD8BCF07170645BA4ABCC07
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2022-04-21T01:12:58Z <<<
```
Registrar is Goolag, and the site is CuckFlared, already 2 red flags.
Also, looking at the requests it's making is rather creepy.\
![](5c44b0ee950b656a29468fdc66decd2babe5d9c34b52a06c1bc4480893c2f15e.png)
And visiting the website for the 2nd time gives me an "Idiot Banned" page featuring just a white page with an unplayable video (request seems to point to https://static.buddylist.co/x/YourNeverGonnaHackMe.mp4 ).\
Literally all I did before getting this page was looking at the top page (and the blurred thumbnails).\
![](88cbb139c3d61dec0d17227aa231662522252220a0bb18c0b12b507b4bd1eea1.png)
So I consider it a failure right from the start.
## Some additional comments by [BananaMulcher](https://thecrowhouse.community/viewtopic.php?p=30779#p30779)
Pushing it through an archiver hangs for a long time at
```
www.joshwhotv.com/plugin/Live/stats.json.php?Menu
```
But eventually produces [a capture](https://archive.ph/U6evB).
The [web archive bot gets fed with captchas](https://web.archive.org/web/20220313101309/https://www.joshwhotv.com/) and other [issues](https://web.archive.org/web/20220228101822if_/https://www.joshwhotv.com/).
Although there are a few [good captures](https://web.archive.org/web/20220401015353/https://www.joshwhotv.com/).
This is behavior typical of sites which heavily profile connections. Probably just inherited from using cloudflare, so even if the people behind joshwho are well intentioned, they have built a visitor profiling honeypot.
I am already critical of Bitchute because of their cloudflare wall. mpv can be used to at least avoid their web player. Let's see if the same is true for joshwhotv:
```
[ffmpeg] https: header='X-Content-Type-Options: nosniff'
[ffmpeg] https: header='Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=redacted"}],"group":"cf-nel","max_age":604800}'
[ffmpeg] https: header='NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}'
[ffmpeg] https: header='Server: cloudflare'
[ffmpeg] https: header=''
```
It *works* but still makes connections to cloudflare :mad:, the same problem Bitchute suffers from. I suppose one could put mpv over a proxy but that's a lot of hoops to jump through when a video uploader could have just used a better host to begin with.