title: joshwhotv.com is yet another fake alternative to JewTube author: 寮 date: 2022-04-21 09:34:28 tags: blog,technology,politics ---- Max Igan followers are now praising https://www.joshwhotv.com/. Let's take a look at the technical part: ``` whois joshwhotv.com Domain Name: JOSHWHOTV.COM Registry Domain ID: 2355609353_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.google.com Registrar URL: http://domains.google.com Updated Date: 2022-01-11T21:48:35Z Creation Date: 2019-01-26T00:25:02Z Registry Expiry Date: 2023-01-26T00:25:02Z Registrar: Google LLC Registrar IANA ID: 895 Registrar Abuse Contact Email: registrar-abuse@google.com Registrar Abuse Contact Phone: +1.8772376466 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: JACK.NS.CLOUDFLARE.COM Name Server: LADY.NS.CLOUDFLARE.COM DNSSEC: signedDelegation DNSSEC DS Data: 2371 13 2 973B29EA87DE6A3C6943D15783CD2083F61DEBB68FD8BCF07170645BA4ABCC07 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/ >>> Last update of whois database: 2022-04-21T01:12:58Z <<< ``` Registrar is Goolag, and the site is CuckFlared, already 2 red flags. Also, looking at the requests it's making is rather creepy.\ ![](5c44b0ee950b656a29468fdc66decd2babe5d9c34b52a06c1bc4480893c2f15e.png) And visiting the website for the 2nd time gives me an "Idiot Banned" page featuring just a white page with an unplayable video (request seems to point to https://static.buddylist.co/x/YourNeverGonnaHackMe.mp4 ).\ Literally all I did before getting this page was looking at the top page (and the blurred thumbnails).\ ![](88cbb139c3d61dec0d17227aa231662522252220a0bb18c0b12b507b4bd1eea1.png) So I consider it a failure right from the start. ## Some additional comments by [BananaMulcher](https://thecrowhouse.community/viewtopic.php?p=30779#p30779) Pushing it through an archiver hangs for a long time at ``` www.joshwhotv.com/plugin/Live/stats.json.php?Menu ``` But eventually produces [a capture](https://archive.ph/U6evB). The [web archive bot gets fed with captchas](https://web.archive.org/web/20220313101309/https://www.joshwhotv.com/) and other [issues](https://web.archive.org/web/20220228101822if_/https://www.joshwhotv.com/). Although there are a few [good captures](https://web.archive.org/web/20220401015353/https://www.joshwhotv.com/). This is behavior typical of sites which heavily profile connections. Probably just inherited from using cloudflare, so even if the people behind joshwho are well intentioned, they have built a visitor profiling honeypot. I am already critical of Bitchute because of their cloudflare wall. mpv can be used to at least avoid their web player. Let's see if the same is true for joshwhotv: ``` [ffmpeg] https: header='X-Content-Type-Options: nosniff' [ffmpeg] https: header='Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=redacted"}],"group":"cf-nel","max_age":604800}' [ffmpeg] https: header='NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}' [ffmpeg] https: header='Server: cloudflare' [ffmpeg] https: header='' ``` It *works* but still makes connections to cloudflare :mad:, the same problem Bitchute suffers from. I suppose one could put mpv over a proxy but that's a lot of hoops to jump through when a video uploader could have just used a better host to begin with.