digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

832
active users

#RateLimiting

0 posts0 participants0 posts today
alecm<p><strong>Reddit appears to be mildly struggling with a sudden influx of traffic over Tor; hopefully they will make some tweaks to help it real soon now</strong></p><p>See the image; similar overloading also seems to be affecting <a href="https://www.reddit.com/r/RedditSafety/comments/yd6hqg/reddit_onion_service_launch/" rel="nofollow noopener" target="_blank">the Reddit Onion site</a>.</p><p>I <a href="https://www.bbc.co.uk/news/articles/cj4ep1znk4zo" rel="nofollow noopener" target="_blank">can’t think why</a> it’s happening, but I’m sure they will sort it out soon. Vulnerable people are being prevented from accessing any content which is labelled as NSFW, including: alcoholism recovery, bulimia, domestic violence discussions…</p><p>Oh, and porn. </p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/age-verification" target="_blank">#ageVerification</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/feed" target="_blank">#feed</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/overload" target="_blank">#overload</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/rate-limiting" target="_blank">#rateLimiting</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/reddit" target="_blank">#reddit</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/tor" target="_blank">#tor</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://swecyb.com/@troed" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>troed</span></a></span> <span class="h-card" translate="no"><a href="https://toots.ch/@dalai" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dalai</span></a></span> <span class="h-card" translate="no"><a href="https://digipres.club/@foone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>foone</span></a></span> The problem will be that one will have to reimplement the "<a href="https://infosec.space/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a>" as <em><a href="https://infosec.space/tags/api0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>api0</span></a></em> from scratch by running inspectors in browsers all the time...</p><ul><li>Remember: The platforms that run these <a href="https://digipres.club/@foone/112685441496803574" rel="nofollow noopener" target="_blank">are hostile</a> to the very <a href="https://infosec.space/@kkarhan/114862595629371002" rel="nofollow noopener" target="_blank">idea</a> of said <em>phat</em> client.</li></ul><p>It'll necessitate all <code>api 0</code> calls to come from the same <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a> and/or <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> as the end-user and hide itself with a fake <a href="https://infosec.space/tags/UserAgent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UserAgent</span></a> to prevent countermeasures like <a href="https://infosec.space/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> and <a href="https://infosec.space/tags/blocking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocking</span></a>.</p>
N-gated Hacker News<p>🎉 Welcome to "Sagyam's Super Fun Guide to Rate Limiting" - because who wouldn't want to spend their weekend playing with token buckets? 💼🤖 Forget Netflix and chilling, it's all about server starvation prevention! 🙃📉<br><a href="https://blog.sagyamthapa.com.np/interactive-guide-to-rate-limiting" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sagyamthapa.com.np/intera</span><span class="invisible">ctive-guide-to-rate-limiting</span></a> <a href="https://mastodon.social/tags/SagyamGuide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SagyamGuide</span></a> <a href="https://mastodon.social/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> <a href="https://mastodon.social/tags/TokenBuckets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TokenBuckets</span></a> <a href="https://mastodon.social/tags/ServerStarvation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ServerStarvation</span></a> <a href="https://mastodon.social/tags/FunLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FunLearning</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ngated</span></a></p>
N-gated Hacker News<p>🚀 Oh wow, <a href="https://mastodon.social/tags/Supabase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Supabase</span></a> is now officially the golden child of the "Too Many Requests" club, raising $200M to ensure even MORE requests get queued. 🙄 I guess their new valuation proves that rate limiting is the new black in tech fashion! 💸<br><a href="https://finance.yahoo.com/news/exclusive-supabase-raises-200-million-112154867.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">finance.yahoo.com/news/exclusi</span><span class="invisible">ve-supabase-raises-200-million-112154867.html</span></a> <a href="https://mastodon.social/tags/TooManyRequests" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TooManyRequests</span></a> <a href="https://mastodon.social/tags/TechFashion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechFashion</span></a> <a href="https://mastodon.social/tags/FundingSuccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FundingSuccess</span></a> <a href="https://mastodon.social/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ngated</span></a></p>
Karsten Schmidt<p><a href="https://mastodon.thi.ng/tags/ReleaseMonday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReleaseMonday</span></a> — One of the recent (already very useful!) new package additions to <a href="https://mastodon.thi.ng/tags/ThingUmbrella" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThingUmbrella</span></a> is:</p><p><a href="https://thi.ng/leaky-bucket" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">thi.ng/leaky-bucket</span><span class="invisible"></span></a></p><p>Leaky buckets are commonly used in communication networks for rate limiting, traffic shaping and bandwidth control, but are equally useful in other domains requiring similar constraints.</p><p>A Leaky Bucket is a managed counter with an enforced maximum value (i.e. bucket capacity). The counter is incremented for each a new event to check if it can/should be processed. If the bucket capacity has already been reached, the bucket will report an overflow, which we can then handle accordingly (e.g. by dropping or queuing events). The bucket also has a configurable time interval at which the counter is decreasing (aka the "leaking" behavior) until it reaches zero again (i.e. until the bucket is empty). Altogether, this setup can be utilized to ensure both an average rate, whilst also supporting temporary bursting in a controlled fashion...</p><p>Related, I've also updated/simplified the rate limiter interceptor in <a href="https://thi.ng/server" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">thi.ng/server</span><span class="invisible"></span></a> to utilize this new package...</p><p><a href="https://mastodon.thi.ng/tags/ThingUmbrella" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThingUmbrella</span></a> <a href="https://mastodon.thi.ng/tags/DataStructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataStructure</span></a> <a href="https://mastodon.thi.ng/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> <a href="https://mastodon.thi.ng/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.thi.ng/tags/TypeScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TypeScript</span></a> <a href="https://mastodon.thi.ng/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a></p>
activenode<p>Rate limiting in Supabase? Cron UI? Get it in #2 of my newsletter</p><p><a href="https://news.supa.guide/p/2-rate-limiting-with-supabase-and-a-cron-ui" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.supa.guide/p/2-rate-limit</span><span class="invisible">ing-with-supabase-and-a-cron-ui</span></a> </p><p><a href="https://mastodon.social/tags/supabase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supabase</span></a> <a href="https://mastodon.social/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://mastodon.social/tags/database" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>database</span></a> <a href="https://mastodon.social/tags/postgres" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postgres</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://tiggi.es/@DeltaWye" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DeltaWye</span></a></span> <span class="h-card" translate="no"><a href="https://corteximplant.com/@SynAck" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SynAck</span></a></span> <span class="h-card" translate="no"><a href="https://pounced-on.me/@Kuniti_shino" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Kuniti_shino</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.de/@ErikUden" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ErikUden</span></a></span> OFC that's the nature of most services tht are open t new users.</p><ul><li><a href="https://infosec.space/tags/Abuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Abuse</span></a> being a statistical inevitability:</li></ul><p><a href="https://infosec.space/tags/Shitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shitter</span></a> (rather <a href="https://infosec.space/tags/Teitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Teitter</span></a> before <a href="https://infosec.space/tags/Mus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mus</span></a> ruined it!) had <a href="https://infosec.space/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> <a href="https://infosec.space/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> to make <a href="https://infosec.space/tags/Spamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spamming</span></a> less effective (255 Statuses per 24hrs) even back when <a href="https://infosec.space/tags/TweetDeck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TweetDeck</span></a> was a seperate company...</p><ul><li>Making dynamical limits that instantly lockout i.e. brand new accounts sending the same.message to 10+ others as a DM within 48 hours of registration should act as a speed-bump to <a href="https://infosec.space/tags/Spammers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spammers</span></a>. </li></ul><p>It won't prevent it entirely but make it more cumbersome.</p><ul><li>Sadly <a href="https://infosec.space/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> <a href="https://infosec.space/tags/Developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Developers</span></a> <a href="https://github.com/mastodon/mastodon/issues/28605" rel="nofollow noopener" target="_blank">refuse to acknowledge the need for efficient filtering.and ban list managment</a> that every other web-facing application / system can do using blocklist feeds.</li></ul><p>This prevents remediation and correction of <a href="https://infosec.space/tags/banlists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>banlists</span></a> &amp; <a href="https://infosec.space/tags/blocklists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklists</span></a>, leaving <a href="https://github.com/greyhat-academy/lists.d/blob/95bab7b3601030e7ad57bfc0516fa91362c8fcd5/blocklists.list.tsv#L21" rel="nofollow noopener" target="_blank">a lot if domains burned forever</a> as the only.options are <em>"replace"</em> and <em>"merge"</em> and the average <a href="https://infosec.space/tags/ActivityPub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActivityPub</span></a> admin or even <a href="https://infosec.space/tags/User" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>User</span></a> isn't going to learn or setup a <a href="https://infosec.space/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a>!</p><ul><li>which is frustrating as I maintain <a href="https://github.com/greyhat-academy/lists.d/blob/main/activitypub.domains.block.list.tsv" rel="nofollow noopener" target="_blank">multiple</a> blocklists to help cleaning up the mess.</li></ul><p>I.e. there isn't really a good way to combat <a href="https://infosec.space/tags/Typosquatting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Typosquatting</span></a>-based <a href="https://infosec.space/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> beyond <a href="https://github.com/greyhat-academy/lists.d/blob/main/typos.domains.block.list.tsv" rel="nofollow noopener" target="_blank">banning.offending domains</a>...</p>
Nicolas Fränkel 🇺🇦🇬🇪<p><a href="https://mastodon.top/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> is an age-old <a href="https://mastodon.top/tags/ReverseProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseProxy</span></a> feature focused on protecting against DDoS attacks. It treats all clients the same and is purely technical. In this day and age, most <a href="https://mastodon.top/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> providers offer different subscription tiers; the higher the tier, the higher the rate limit, and the more you pay incidentally. It’s not technical anymore and requires to differentiate between clients.</p><p>In this post, I want to detail how to do it with <a href="https://mastodon.top/tags/ApacheAPISIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheAPISIX</span></a>.</p><p><a href="https://blog.frankel.ch/different-rate-limits-apisix/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.frankel.ch/different-rate</span><span class="invisible">-limits-apisix/</span></a></p>
alecm<p><strong>Dell API abused to steal 49 million customer records in data breach | …an example of poor security through lack of both rate limiting &amp; behavioural modelling</strong></p><blockquote><p>Once they gained access to the portal, Menelik told BleepingComputer they had created a program that generated 7-digit service tags and submitted them to the portal page starting in March to scrape the returned information.</p><p>As the portal reportedly did not include any rate limiting, the threat actor claims they could harvest the information of 49 million customer records by generating 5,000 requests per minute for three weeks, without Dell blocking the attempts.</p></blockquote><p><a href="https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/" rel="nofollow noopener" target="_blank">https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/</a></p><p><a href="https://alecmuffett.com/article/109806" class="" rel="nofollow noopener" target="_blank">https://alecmuffett.com/article/109806</a></p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/dell" target="_blank">#dell</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/privacy" target="_blank">#privacy</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://alecmuffett.com/article/tag/rate-limiting" target="_blank">#rateLimiting</a></p>
IT News<p>“MFA Fatigue” attack targets iPhone owners with endless password reset prompts - Enlarge / They look like normal notifications, but opening an iPhone wi... - <a href="https://arstechnica.com/?p=2012822" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2012822</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/mobilephishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobilephishing</span></a> <a href="https://schleuss.online/tags/passwordreset" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordreset</span></a> <a href="https://schleuss.online/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/icloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icloud</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a></p>
django<p>Frustrating to watch d/l go from 2m to 20 minutes</p><p><a href="https://social.coop/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a></p>
Orhun Parmaksız 👾<p>Here is how you can add rate limiting to your Rust/Axum service! ✨</p><p>🦀 **tower-governor**: Rate Limiting middleware for Tower/Axum/Tonic/Hyper (utilizing the governor crate).</p><p>⭐ GitHub: <a href="https://github.com/benwis/tower-governor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/benwis/tower-govern</span><span class="invisible">or</span></a></p><p><a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://fosstodon.org/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://fosstodon.org/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://fosstodon.org/tags/service" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>service</span></a> <a href="https://fosstodon.org/tags/axum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>axum</span></a> <a href="https://fosstodon.org/tags/middleware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>middleware</span></a></p>
Indusface<p>💪 Empower your <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> team to detect and respond to <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> attacks effectively.</p><p>Read our latest blog, which provides a brief guide to mastering traffic analysis techniques: <a href="https://bit.ly/3tRAnJi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3tRAnJi</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ddosattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosattacks</span></a> <a href="https://infosec.exchange/tags/ddosprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosprotection</span></a> <a href="https://infosec.exchange/tags/ddosmitigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosmitigation</span></a> <a href="https://infosec.exchange/tags/ddostraffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddostraffic</span></a> <a href="https://infosec.exchange/tags/webapplications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapplications</span></a> <a href="https://infosec.exchange/tags/apiapplications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apiapplications</span></a> <a href="https://infosec.exchange/tags/apis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apis</span></a> <a href="https://infosec.exchange/tags/waap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waap</span></a> <a href="https://infosec.exchange/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://infosec.exchange/tags/apptrana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apptrana</span></a> <a href="https://infosec.exchange/tags/indusface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indusface</span></a></p>
Orhun Parmaksız 👾<p>Found a neat Rust library for rate-limiting!</p><p>🦀 **leaky-bucket**: A token-based rate limiter based on the leaky bucket algorithm.</p><p>⭐ GitHub: <a href="https://github.com/udoprog/leaky-bucket" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/udoprog/leaky-bucke</span><span class="invisible">t</span></a></p><p>📚 Docs: <a href="https://docs.rs/leaky-bucket" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">docs.rs/leaky-bucket</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://fosstodon.org/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://fosstodon.org/tags/library" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>library</span></a> <a href="https://fosstodon.org/tags/async" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>async</span></a></p>
scy<p>So, anyone of you doing <a href="https://chaos.social/tags/IP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IP</span></a> based <a href="https://chaos.social/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a> in a (web) application? Yeah? How do you deal with <a href="https://chaos.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> addresses? Especially the fact that an attacker could easily have 2^64 addresses, or even 2^80 or something. Do you limit on /64 basis? How do you deal with the fact that an attacker with a /48 could add 65k entries to your limiting table no problem?</p><p><a href="https://adam-p.ca/blog/2022/02/ipv6-rate-limiting/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">adam-p.ca/blog/2022/02/ipv6-ra</span><span class="invisible">te-limiting/</span></a> is a good introduction into the issue.</p><p><a href="https://chaos.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDev</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a></p>
Öffentlicher Dienst Memes<p>Bei der unkoordinierten Angebotsauswahl der Ausschreibung am verzweifeln? Probieren Sie es doch mal mit <a href="https://det.social/tags/RateLimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RateLimiting</span></a></p>
📡 RightToPrivacy & Tech Tips<p>What Is "Heavenbanning"? &amp; Possible Future (transparency) Implications Of Blocking 3rd Party Access To Platforms (+ Reddit / Twitter News) </p><p><a href="https://fosstodon.org/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://fosstodon.org/tags/Reddit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reddit</span></a> <a href="https://fosstodon.org/tags/Twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Twitter</span></a> <a href="https://fosstodon.org/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://fosstodon.org/tags/frontend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frontend</span></a> <a href="https://fosstodon.org/tags/nitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nitter</span></a> <a href="https://fosstodon.org/tags/invidious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>invidious</span></a> <a href="https://fosstodon.org/tags/teddit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>teddit</span></a> <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://fosstodon.org/tags/video" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>video</span></a> <a href="https://fosstodon.org/tags/heavenbanning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>heavenbanning</span></a> <a href="https://fosstodon.org/tags/shadowbanning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shadowbanning</span></a> <a href="https://fosstodon.org/tags/decentralization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralization</span></a> <a href="https://fosstodon.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://fosstodon.org/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://fosstodon.org/tags/bots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bots</span></a> <a href="https://fosstodon.org/tags/peertube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>peertube</span></a></p><p><a href="https://tube.tchncs.de/w/4vLZ1riV7dLugn6mQ37DqG" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tube.tchncs.de/w/4vLZ1riV7dLug</span><span class="invisible">n6mQ37DqG</span></a></p>
Shawn Hooper (he/him)<p>Catching up on newsletters in my inbox. Love the one featuring an article on “Rate Limiting Fundamentals” that was sent out yesterday. Wonder why they pulled that one out of their archive? :) </p><p><a href="https://open.substack.com/pub/bytebytego/p/rate-limiting-fundamentals?r=kavi4&amp;utm_medium=ios&amp;utm_campaign=post" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.substack.com/pub/bytebyte</span><span class="invisible">go/p/rate-limiting-fundamentals?r=kavi4&amp;utm_medium=ios&amp;utm_campaign=post</span></a></p><p><a href="https://fosstodon.org/tags/api" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>api</span></a> <a href="https://fosstodon.org/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://fosstodon.org/tags/devlife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devlife</span></a></p>
Nicolas Fränkel 🇺🇦🇬🇪<p>The right feature at the right place <a href="https://blog.frankel.ch/right-feature-right-place/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.frankel.ch/right-feature-</span><span class="invisible">right-place/</span></a></p><p><a href="https://mastodon.top/tags/softwarearchitecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwarearchitecture</span></a> <a href="https://mastodon.top/tags/systemarchitecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemarchitecture</span></a> <a href="https://mastodon.top/tags/solutionarchitecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>solutionarchitecture</span></a> <a href="https://mastodon.top/tags/ratelimiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ratelimiting</span></a> <a href="https://mastodon.top/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>
heise online (inoffiziell)In CI/CD-Variablen sollen Sonderzeichen keine Probleme mehr bereiten. Ultimate-Nutzer erhalten neue Möglichkeiten für das Umsetzen von Sicherheitsrichtlinien. <br><a href="https://www.heise.de/news/Versionsverwaltung-GitLab-15-6-oeffnet-sich-fuer-Sonderzeichen-7350153.html" rel="nofollow noopener" target="_blank">Versionsverwaltung: GitLab 15.6 öffnet sich für Sonderzeichen</a><br>