Dont-Copy-That-Floppy

Results 11 comments of Dont-Copy-That-Floppy

```pytb Traceback (most recent call last): File "bna", line 281, in main() File "C:\Users\Data\AppData\Local\Programs\Python\Python37-32\lib\site-packages\click\core.py", line 764, in __call__ return self.main(*args, **kwargs) File "C:\Users\Data\AppData\Local\Programs\Python\Python37-32\lib\site-packages\click\core.py", line 717, in main rv = self.invoke(ctx)...

Turns out the error isn't about the option values, but the value option. IE, (serial, "secret", secret), the last option is the value option, which is currently a byte array.

Just fyi, your code is hard as shit to follow and debug. I have never seen python be written so hard to follow. Your restore function in http is where...

I mean when I change anything in any of the code inside the directory python-bna, I get zero output change. And when I say your code is hard as shit...

lol, github has thumbs down like facebook. I'll spend some time on it this weekend. It's some call being made in the restore function inside http, and if it's working...

confirmed. there may be no easy fix. the javascript is injected as inline script which is now blocked by cloudflare turnsite. only solution that may work is running the code...

> > confirmed. there may be no easy fix. the javascript is injected as inline script which is now blocked by cloudflare turnsite. only solution that may work is running...

> > I'm not sure I understand what you're saying. Can you provide some code as an example? > > CF will not work until this shows overriden values: >...

So I can confirm, cloudflare turnstile is doing some kind of fingerprinting using an unknown method. I've tested a site now with multiple configurations. Using a hardened firefox, and a...

Okay, so I think it's something to do with fingerprinting the software stack and the useragent. I think they must be using font, tls, webgl, and js api calls to...