Peep dat receded hairline on an animal that's covered in, y'know, hair.
The waistline isn't near big enough for Joshua's massive cunt. Points for the tranny language T-shirt though!View attachment 57299
Some niggerish coon gave this fat uncle tom his own fursona and the likes and dislikes is accurate, found this in the "Art for Null" thread
Who cares what Joshua thinks? Trolling is funny.Who in the right mind would think that Null would appreciate a furry art?
View attachment 57299
Some niggerish coon gave this fat uncle tom his own fursona and the likes and dislikes is accurate, found this in the "Art for Null" thread
reminder that this the same site that post this.Who in the right mind would think that Null would appreciate a furry art?
Setting up the account was easy if it is just YouTube videos.TBF... setting up a movie night on cytube isn't hard, half the tricky part is getting people to actually install the tampermonkey script to use stuff on gdrive.
So it not happening, site troubles or no was kind of fuckin' lol. Kengle really shouldn't have announced it til he actually knew what he was doing and it was kind of obvious he didn't.
(I literally do the shit 4 days a week on cytube)
Setting up the account was easy if it is just YouTube videos.
I'm not installing scripts on my browser. Why can't the videos be hosted on Onionfarms.com?
This is what I'm not understanding though. The best hosting solution for cytube is a misuse of fucking google drive, only possible by way of a hack script running locally on every client?It's the only way you get shit off gdrive and probably the only way you could get the videos to work on cytube even if you host them here. Cytube is designed out the box to only work with a handful of sites but to get it to accept stuff from gdrive or another site you do need the script.
This is what I'm not understanding though. The best hosting solution for cytube is a misuse of fucking google drive, only possible by way of a hack script running locally on every client?
I'm all for sticking it to Pajeetkikes, but surely there must be a better way in 2024?
InterestingFeel free to ask around, but far as I know that's what all the channels do in one way or another. If you aren't having to install the script they are running in the background and injecting it into the files if it's hosted on google.
Youtube, Odysee, Internet Archive, bitchute, and a few other places will work too but if you want anything that's not there basically the only way I know of.
You could try other places to host the files but I do think if you aren't doing it from them the script comes into play? I'd have to check to be sure.... I've seen other people use catbox (it runs like shit), or https://pomf2.lain.la/ .... you know just weird file hosting shit but it's mostly too small for movies of any decent resolution.
Edit:
Ran it through Chat GPT and asked for it's thoughts on it and this what I got back. (whatever that is worth to you)
This Tampermonkey script allows users to play Google Drive videos on CyTube, a platform for synchronized video watching. Here's a detailed breakdown of its components and functionality:
Metadata
javascript
Copy code
// ==UserScript==
// @NAme Google Drive Video Player for CyTube
// @namespace gdcytube
// @description Play Google Drive videos on CyTube
// @include https://cytu.be/r/*
// @include https://www.cytu.be/r/*
// @grant unsafeWindow
// @grant GM_xmlhttpRequest
// @grant GM.xmlHttpRequest
// @connect docs.google.com
// @run-at document-end
// @version 1.7.0
// ==/UserScript==
- @NAme: Name of the script.
- @namespace: Namespace to prevent naming conflicts.
- @description: Short description of the script.
- @include: URLs where the script should run.
- @grant: Permissions the script requires (unsafeWindow for interacting with the webpage's window object, GM_xmlhttpRequest and GM.xmlHttpRequest for making cross-origin requests).
- @connect: Domain allowed for cross-origin requests.
- @run-at: Specifies when the script should run (at the end of the document loading).
Main Script
Utility Functions
- debug: Logs messages to the console.
- httpRequest: Handles HTTP requests, compatible with different versions of Greasemonkey/Tampermonkey.
- ITAG_QMAP and ITAG_CMAP: Maps ITAG values to video quality and content types.
Core Functionality
- getVideoInfo: Fetches video information from Google Drive using the provided video ID.
- Constructs the URL for the request.
- Makes the HTTP GET request.
- Processes the response to extract video metadata.
- Handles various errors (e.g., requiring login, missing video streams).
- mapLinks: Organizes video links by quality using the ITAG mappings.
Polling Mechanism
- getGoogleDriveMetadata_GM: Sets up polling for fetching video metadata.
- Polls for the video ID.
- Calls the callback with the fetched metadata.
- setupGDPoll: Sets up a polling mechanism to handle cross-boundary communication between the browser's JS environment and the script's sandbox.
Compatibility and Initialization
javascript
- isTampermonkeyCompatible: Checks if the script is running under a compatible environment (Tampermonkey or Violentmonkey).
- Initialization: Depending on compatibility:
- Directly assigns getVideoInfo to unsafeWindow.getGoogleDriveMetadata.
- Uses the polling workaround for other environments.
Copy code
if (isTampermonkeyCompatible()) {
unsafeWindow.getGoogleDriveMetadata = getVideoInfo;
} else {
debug('Using non-TM polling workaround');
unsafeWindow.getGoogleDriveMetadata = exportFunction(
getGoogleDriveMetadata_GM, unsafeWindow);
setupGDPoll();
}
unsafeWindow.console.log('Initialized userscript Google Drive player');
unsafeWindow.hasDriveUserscript = true;
unsafeWindow.driveUserscriptVersion = '1.7';
- Initializes the userscript, setting up the necessary functions and indicating that the script is active.
Error Handling
Overall, this script allows CyTube users to fetch and play Google Drive videos by handling the necessary metadata requests and processing the video streams, accommodating different environments with a polling mechanism when required.
- Catches any errors during the script execution and logs them to the console.
Is there anything weird or suspicious going on with the script?
The script appears to be designed for a legitimate purpose: enabling the playback of Google Drive videos on CyTube. However, there are a few points to consider to ensure its safety and legitimacy:
1. Permissions and API Usage
- @grant unsafeWindow: This allows the script to access the webpage's window object, which can be risky if misused. It can potentially interact with or alter the webpage in ways that the user might not expect.
- @grant GM_xmlhttpRequest / GM.xmlHttpRequest: These are necessary for making cross-origin requests, but they also have the potential to be misused for data exfiltration.
2. HTTP Requests to Google
- The script makes requests to https://docs.google.com/get_video_info to fetch video metadata. This is a normal use case for obtaining video streams, but it's important to ensure that these requests are not being used to collect sensitive information.
3. Polling Mechanism
- The script uses a polling mechanism to check for metadata requests, which is a bit unconventional. This might be a workaround for sandbox limitations, but it can also introduce performance overhead and complexity.
4. Potential Privacy Concerns
- The script requires the user to be logged into their Google account to access certain videos. This means that it might be able to access information associated with the user's Google session if misused.
5. Debugging Messages
- The script logs messages to the console, which is typical for debugging. However, excessive logging can sometimes be used to mask other activities.
Recommendations for Verification
- Review the Source: Ensure that the source of the script is trustworthy and well-reviewed by other users.
- Analyze Network Traffic: Use browser developer tools to monitor the network requests made by the script to confirm that no unexpected data is being sent.
- Check for Updates: Ensure that the script is regularly updated and maintained, reducing the risk of security vulnerabilities.
Detailed Review
- Error Handling: The script has robust error handling, which is a good practice.
- Compatibility Handling: The script accounts for different environments (Tampermonkey, Violentmonkey), which indicates thorough development.
- Metadata Mapping: The mapping of video quality and content types is straightforward and seems focused on its intended functionality.
Conclusion
There doesn't appear to be anything overtly malicious or suspicious in the script. However, the use of unsafeWindow and the need for cross-origin requests necessitate a careful review of the source and behavior. Ensuring the script is sourced from a reputable place and monitoring its network activity can help mitigate potential risks.
There was a shooting at a splash pad/rec center in Michigan, but no troons were involved so Kiwi remains silent, despite the dude living with his mother and clearly losing his mind.
Maybe it hits too close to home and mirrors Jersh's future?
I was checking the featured threads and not the actual subforum, that's my bad. Good catchArticle in A&N about it yesterday actually.
I was checking the featured threads and not the actual subforum, that's my bad. Good catch
he's fat lolThat's because Joshua is the biggest lolcow of them all.
My guess was accurate. It was Chingtastic Chong who was tasked with rewriting the OP for Dick Masterson's as a part of Josh's personal vendetta.Josh has instructed one of his moderators, most likely Chingtastic Chong, with rewriting the thread of his blood enemy who's irritated him greatly, Dick Masterson. He's done this because his weekly attacks of him on his podcast have failed to gain any traction outside of his base of supporters. Not a personal army website btw!
The Biggest Problem with Mint Salad (June 14th, 2024) - Mad at the Internet
https://madattheinternet.com/2024/06/14/the-biggest-problem-with-mint-salad/ Black samurai, Audrey Hale's penis in her head, Patrick's chairs, LazerPig tries to define family, RPGNet's meltdown, and Drumble.com
There was another thread that altistic rewrote at Null's request because Null was beefing with them. Does anyone remember who that was?My guess was accurate. It was Chingtastic Chong who was tasked with rewriting the OP for Dick Masterson's as a part of Josh's personal vendetta.
Oh boy. Get ready for the smoking gun proof Dick Masterson has a fursona named "Juju the Cow" who loves dressing up as a cow and getting pegged in the butt! This will end Dick Masterson once and for all! (The proof is the alleged words of an ex-partner of Dick's. Note that even if these are true she says Dick doesn't dress up like a furry at all. Also note that while she says she bought him a butt plug she never mentions him using it or pegging him whatsoever.)
View attachment 57317
It gets better. Null once again goes in to the old evidence folder to dig up things he previously dismissed as gay ops to own Dick.My guess was accurate. It was Chingtastic Chong who was tasked with rewriting the OP for Dick Masterson's as a part of Josh's personal vendetta.
Oh boy. Get ready for the smoking gun proof Dick Masterson has a fursona named "Juju the Cow" who loves dressing up as a cow and getting pegged in the butt! This will end Dick Masterson once and for all! (The proof is the alleged words of an ex-partner of Dick's. Note that even if these are true she says Dick doesn't dress up like a furry at all. Also note that while she says she bought him a butt plug she never mentions him using it or pegging him whatsoever.)
View attachment 57317
Shid he's desperate this is a huge swing and a miss. The ears are different and the cam girl has a downturned nose whereas marie has a upturned nose. I wonder if Masterson has some receipts he's been waiting to drop?It gets better. Null once again goes in to the old evidence folder to dig up things he previously dismissed as gay ops to own Dick.
View attachment 57319