If no referrer header is sent, CF will let it through. You can copy + paste the url into a new tab to get to it, but I’m guessing some apps don’t provide a referrer.
Shadow
Infrastructure nerd, gamer, and Lemmy.ca maintainer
- 0 Posts
- 10 Comments
Shadow@lemmy.cato
Technology@lemmy.world•Firm quietly boosts H.264 streaming license fees from $100,000 up to staggering $4.5 million — backbone codec of the internet gets meteoric increase, AVC hikes follow disastrous H.265 licensing increaEnglish
13·3 days agoVia LA told Streaming Media that it contacted unlicensed media companies during 2025 to give them “a window to secure a license” under the previous terms, but the company didn’t go to the trouble of issuing a press release or public announcement, opting instead for direct outreach. Any company that didn’t respond or wasn’t contacted now faces the new rate structure as its starting point for negotiations.
Shadow@lemmy.cato
Lemmy Shitpost@lemmy.world•To whoever decided it is acceptable to wear yoga pants in public:
671·11 days agoThat should be a Canadian flag. You can thank lululemon for it.
Shadow@lemmy.cato
No Stupid Questions@lemmy.world•So say, someone lives in an English speaking country and wanna see a movie in the threaters but they struggle to understand English, how are they supposed to watch it?
33·17 days agoSome theaters have closed captioning done via a backwards display at the back of the theater, you wear special glasses or something that have mirrors. I think some may also do alternate languages.
Shadow@lemmy.cato
Technology@lemmy.world•New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprisesEnglish
62·1 month agoActual paper here is more understandable than this article - https://www.ndss-symposium.org/ndss-paper/airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks/
First, Wi-Fi keys that protect broadcast frames are improperly managed and can be abused to bypass client isolation. Second, isolation is often only enforced at the MAC or IP layer, but not both. Third, weak synchronization of a client’s identity across the network stack allows one to bypass Wi-Fi client isolation at the network layer instead, enabling the interception of uplink and downlink traffic of other clients as well as internal backend devices.
Shadow@lemmy.cato
Technology@lemmy.world•Parody site ClownStrike refused to bow to CrowdStrike’s bogus DMCA takedownEnglish
1·2 years agoSounds like they could use some more sites linking to them to improve SEO. https://clownstrike.lol/

Go voltuneer at a shelter and walk dogs for them first. I don’t think you’ve considered how much work is involved in a dog, are you prepared to adopt a small child?