-
Should I be able to switch to a TTY and bypass the lockout using the correct password?
So far I am able to
-
Players are able to spam votes (most importantly kick votes) by leaving and rejoining, making them able to vote again without waiting ~2.5 minutes that is usually applied after the vote you started fa…
-
- [x] I have searched open and closed issues for duplicates
- [x] I am submitting a bug report for existing functionality that does not work as intended
- [x] This isn't a feature request or a d…
-
**Describe the bug**
The program's email field functionality relies on client-side file type checks, which can be bypassed by modifying the value within the submitted request, compromising the integr…
-
Per mockups and notes in [Figma](https://www.figma.com/design/k13H0LDF7MOYK9s8H2R3UZ/OONI-Explorer?node-id=699-50330&t=WC611z50Zwf1vTpn-0), create the 'Circumvention' page for the new Thematic Censors…
-
This shouldn't compile
``` nimrod
import typetraits
proc p(x: int8|int16) =
echo x.type.name # int
p(1)
```
ghost updated
1 month ago
-
### Issue Details
**Issue:**
DPI circumvention doesn't work well on many Russian Internet service providers.
For example,
- A couple of weeks ago, I set up Adguard for a friend living in St. Pe…
-
DPI (Deep Packet Inspection) circumvention
DPI (Deep Packet Inspection) is a system of analysis and traffic filtering by packet content, as well as the accumulation of statistical data. Using this te…
-
> The protocol whitelister only allows (“whitelists”) a small list of protocols to be used, posing a threat to almost all existing censorship-evasion tool deployments (VPNs, Tor, Proxies, etc).
###…
-
Would it be possible to get a minimum how-to on how to set up (or circumvent) auth0 somewhere down the road? This would make local development onboarding a lot easier!