[Home] [Catalog] [Search] [Inbox] [Write PM] [Admin]
[Return]

Posting mode: Reply

(for deletion, 8 chars max)
  • Allowed file types are: gif, jpg, jpeg, png, bmp, swf, webm, mp4
  • Maximum file size allowed is 50000 KB.
  • Images greater than 200 * 200 pixels will be thumbnailed.



We will watch Midori no Hibi next Saturday 18:00 UTC [Info] [Countdown]


49 KB
>attach 1.9MiB file
>post header shows 1990Kb
>download file
>file is 2.6 MiB
Visually file is identical to original, did not look further yet.
File in question:
https://up.heyuri.net/src/4542.jpg
Post:
https://img.heyuri.net/b/koko.php?res=146192#q146250
>>
Inflates other JPEGs too.
Swithcing off JS has no effect.
Gyate 💓Kanako💓 in OP was not affected.
Does engine recompress JPEGs for some reason?
>>
overlooking R8.e violation for the sake of discussion...

I dunno, but the file at https://img.heyuri.net/b/src/1749754302010.jpg is indeed different than the one at https://up.heyuri.net/src/4542.jpg (viewable by CTRL+I on Firefox)
Maybe has to do with the way images are processed by kokonotsuba?
>>
>>68713
Sorry for greentext.
>>
Is img.hayuri.net running git+https://github.com/Heyuri/kokonotsuba/@main now?
>>
116 KB
>>68713
>Does engine recompress JPEGs for some reason?
It does, since ba9208e43f29d07f357afbe7d9f26f2c1736b02e, 2025-04-24 00:33:13+1000
https://github.com/Heyuri/kokonotsuba/blob/main/code/libraries/lib_file.php#L190
It's a very, excentric, way to remove EXIF.
Better just call "exiftool", like (for example) LynxChan does (https://gitgud.io/LynxChan/LynxChan/-/blob/master/src/be/engine/formOps.js#L10)
>>
We discussed it in DevChat after this thread was made - hachikuji is gonna look into alternative ways of removing/modifying EXIF tomoz
>>
that's the malware kaguya embeds into all files to extract our OC without our consent ヽ(`Д´)ノ
>>
>>68714
>Sorry for greentext.
<not sorry for this pink text, just gotta know when you can play your cards!ヽ(´ー`)ノ
>>
(regarding the bug, it has been fix'd)
>>
13 KB
>>68774
Thanks :3


Delete post: []