SharedInboxController
Request
GET Parameters
None
POST Parameters
None
Uploaded Files
None
Request Attributes
Key | Value |
---|---|
_controller | "App\Controller\ActivityPub\SharedInboxController" |
_firewall_context | "security.firewall.map.context.main" |
_route | "ap_shared_inbox" |
_route_params | [] |
_security_firewall_run | "_security_main" |
_stopwatch_token | "0fb32e" |
Request Headers
Header | Value |
---|---|
accept | "*/*" |
accept-encoding | "gzip" |
content-length | "6379" |
content-type | "application/activity+json" |
date | "Mon, 23 Jun 2025 21:27:11 GMT" |
digest | "SHA-256=CqBjADSsyhWCNflNftBWRpND6tdRqpxvqjfc2jQ41GM=" |
host | "kbin.spritesserver.nl" |
signature | "keyId="https://lemmy.ml/c/privacy#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="Q+dzCFt9iFNXcT/COl0WVseX8xnPzwf8i8YuMgVKEaGuSif5ka7Up8cppXQZoEeBxjBJjuM8bldnvSO3vOFX4WjFwidNo9U8BUU0+oQylVcOEcl0pXsC6S62cQCj5CRNTijz5f4ZRwH62iQgatRXmmX478jSRfnGjw3SbHWLd9/QEMmXHvq23zU3QNgngogPlZNTp+nOXyRYGOyZ0/VIs2QSYuIyjxY08VbUP7mYiQXNnnS/owXv3LCHW28SYvfR7UDVg5ZmUn8AhqgIsU7jsExpurHHkFnyu9xAz2bfxt9qrGVBzjSraV7J9EpQSSReE7VGyXm/oYnueD3pw+0osQ=="" |
user-agent | "Lemmy/0.19.12; +https://lemmy.ml" |
x-php-ob-level | "1" |
Request Content
Pretty
{ "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "actor": "https:\/\/lemmy.ml\/c\/privacy", "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "id": "https:\/\/lemmy.world\/activities\/update\/d3a16b26-daa0-4355-82ed-20dbe86cece9", "actor": "https:\/\/lemmy.world\/u\/happeningtofry99158", "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "type": "Page", "id": "https:\/\/lemmy.world\/post\/31859998", "attributedTo": "https:\/\/lemmy.world\/u\/happeningtofry99158", "to": [ "https:\/\/lemmy.ml\/c\/privacy", "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "name": "Is there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?", "cc": [], "content": "<p>As a security-conscious user, I\u2019ve used NoScript since Firefox\u2019s early days, but its restrictive nature has become frustrating. I\u2019m often forced to go unprotected just to access websites with multiple scripts running on different domains, which defeats the purpose of using NoScript and balances security and usability that it once provided.<\/p>\n<p>Is there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?<\/p>\n<p>by sensitive information I\u2019m referring to<\/p>\n<ul>\n<li>local machine time<\/li>\n<li>local machine ram<\/li>\n<li>local machine operating system + version<\/li>\n<li>local machine hardware<\/li>\n<li>Serial Number<\/li>\n<li>Hardware ID<\/li>\n<li>UUID<\/li>\n<li>Windows Device ID<\/li>\n<li>Windows Product ID<\/li>\n<li>\u2026<\/li>\n<\/ul>\n<p>greatly appreciate any insight<\/p>\n<hr \/>\n<p>EDIT:<\/p>\n<p>could be possible solution<\/p>\n<p><a href=\"https:\/\/discuss.grapheneos.org\/d\/16025-vanadium-and-what-to-use-on-desktop\/19\">discuss.grapheneos.org\/d\/\u2026\/19<\/a><\/p>\n<ul>\n<li><s>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman\u2019s article The JavaScript Trap.<\/s><\/li>\n<li><a href=\"https:\/\/jshelter.org\/\" rel=\"nofollow\">JShelter<\/a>: Mitigates potential threats from JavaScript, including fingerprinting, tracking, and data collection. Slightly modifies the results of API calls, differently on different domains, so that the cross-site fingerprint is not stable. Applies security counter-measures that are likely not to break web pages. Allows fine-grained control over the restrictions and counter-measures applied to each domain.<\/li>\n<\/ul>\n<hr \/>\n<p><a href=\"https:\/\/swg-empire.de\/u\/bjoern_tantau\" rel=\"nofollow\">@bjoern_tantau@swg-empire.de<\/a><\/p>\n<blockquote>\n<p>Most of those things cannot be collected through JavaScript.<\/p>\n<p>Local time can.<\/p>\n<p>RAM can only be approximated to protect user privacy. Edit: And it\u2019s not available on Firefox.<\/p>\n<p>OS+version are already in your browser\u2019s user-agent string that is sent out with every request you make.<\/p>\n<p>Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.<\/p>\n<p>There is no way to get a serial number or similar.<\/p>\n<\/blockquote>\n<p>To spoof timezone\/OS+version\/browser+version \u2026 and disable WebGL, use <a href=\"https:\/\/sereneblue.github.io\/chameleon\/\">sereneblue.github.io\/chameleon\/<\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/lemmy.world\/post\/31885153\">lemmy.world\/post\/31885153<\/a><\/li>\n<\/ul>\n", "mediaType": "text\/html", "source": { "content": "As a security-conscious user, I've used NoScript since Firefox's early days, but its restrictive nature has become frustrating. I'm often forced to go unprotected just to access websites with multiple scripts running on different domains, which defeats the purpose of using NoScript and balances security and usability that it once provided.\n\nIs there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?\n\nby sensitive information I'm referring to\n- local machine time\n- local machine ram\n- local machine operating system + version\n- local machine hardware\n- Serial Number\n- Hardware ID\n- UUID\n- Windows Device ID\n- Windows Product ID\n- ...\n\ngreatly appreciate any insight\n\n---\n\nEDIT: \n\ncould be possible solution\n\nhttps:\/\/discuss.grapheneos.org\/d\/16025-vanadium-and-what-to-use-on-desktop\/19\n- ~~LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.~~\n- [JShelter](https:\/\/jshelter.org\/\n): Mitigates potential threats from JavaScript, including fingerprinting, tracking, and data collection. Slightly modifies the results of API calls, differently on different domains, so that the cross-site fingerprint is not stable. Applies security counter-measures that are likely not to break web pages. Allows fine-grained control over the restrictions and counter-measures applied to each domain.\n\n---\n\n[@bjoern_tantau@swg-empire.de](https:\/\/swg-empire.de\/u\/bjoern_tantau) \n> Most of those things cannot be collected through JavaScript.\n> \n> Local time can.\n> \n> RAM can only be approximated to protect user privacy. Edit: And it\u2019s not available on Firefox.\n> \n> OS+version are already in your browser\u2019s user-agent string that is sent out with every request you make.\n> \n> Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.\n> \n> There is no way to get a serial number or similar.\n\nTo spoof timezone\/OS+version\/browser+version ... and disable WebGL, use https:\/\/sereneblue.github.io\/chameleon\/\n- https:\/\/lemmy.world\/post\/31885153\n", "mediaType": "text\/markdown" }, "attachment": [], "sensitive": false, "published": "2025-06-23T12:28:02.039590Z", "updated": "2025-06-23T21:26:25.399410Z", "audience": "https:\/\/lemmy.ml\/c\/privacy", "tag": [ { "href": "https:\/\/lemmy.world\/post\/31859998", "name": "#privacy", "type": "Hashtag" } ] }, "cc": [ "https:\/\/lemmy.ml\/c\/privacy" ], "type": "Update", "audience": "https:\/\/lemmy.ml\/c\/privacy" }, "cc": [ "https:\/\/lemmy.ml\/c\/privacy\/followers" ], "type": "Announce", "id": "https:\/\/lemmy.ml\/activities\/announce\/update\/b35808a8-d3dc-422a-a6cd-3232833e8d7d" }
Raw
{"@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"actor":"https://lemmy.ml/c/privacy","to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"id":"https://lemmy.world/activities/update/d3a16b26-daa0-4355-82ed-20dbe86cece9","actor":"https://lemmy.world/u/happeningtofry99158","@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"type":"Page","id":"https://lemmy.world/post/31859998","attributedTo":"https://lemmy.world/u/happeningtofry99158","to":["https://lemmy.ml/c/privacy","https://www.w3.org/ns/activitystreams#Public"],"name":"Is there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?","cc":[],"content":"<p>As a security-conscious user, I’ve used NoScript since Firefox’s early days, but its restrictive nature has become frustrating. I’m often forced to go unprotected just to access websites with multiple scripts running on different domains, which defeats the purpose of using NoScript and balances security and usability that it once provided.</p>\n<p>Is there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?</p>\n<p>by sensitive information I’m referring to</p>\n<ul>\n<li>local machine time</li>\n<li>local machine ram</li>\n<li>local machine operating system + version</li>\n<li>local machine hardware</li>\n<li>Serial Number</li>\n<li>Hardware ID</li>\n<li>UUID</li>\n<li>Windows Device ID</li>\n<li>Windows Product ID</li>\n<li>…</li>\n</ul>\n<p>greatly appreciate any insight</p>\n<hr />\n<p>EDIT:</p>\n<p>could be possible solution</p>\n<p><a href=\"https://discuss.grapheneos.org/d/16025-vanadium-and-what-to-use-on-desktop/19\">discuss.grapheneos.org/d/…/19</a></p>\n<ul>\n<li><s>LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman’s article The JavaScript Trap.</s></li>\n<li><a href=\"https://jshelter.org/\" rel=\"nofollow\">JShelter</a>: Mitigates potential threats from JavaScript, including fingerprinting, tracking, and data collection. Slightly modifies the results of API calls, differently on different domains, so that the cross-site fingerprint is not stable. Applies security counter-measures that are likely not to break web pages. Allows fine-grained control over the restrictions and counter-measures applied to each domain.</li>\n</ul>\n<hr />\n<p><a href=\"https://swg-empire.de/u/bjoern_tantau\" rel=\"nofollow\">@bjoern_tantau@swg-empire.de</a></p>\n<blockquote>\n<p>Most of those things cannot be collected through JavaScript.</p>\n<p>Local time can.</p>\n<p>RAM can only be approximated to protect user privacy. Edit: And it’s not available on Firefox.</p>\n<p>OS+version are already in your browser’s user-agent string that is sent out with every request you make.</p>\n<p>Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.</p>\n<p>There is no way to get a serial number or similar.</p>\n</blockquote>\n<p>To spoof timezone/OS+version/browser+version … and disable WebGL, use <a href=\"https://sereneblue.github.io/chameleon/\">sereneblue.github.io/chameleon/</a></p>\n<ul>\n<li><a href=\"https://lemmy.world/post/31885153\">lemmy.world/post/31885153</a></li>\n</ul>\n","mediaType":"text/html","source":{"content":"As a security-conscious user, I've used NoScript since Firefox's early days, but its restrictive nature has become frustrating. I'm often forced to go unprotected just to access websites with multiple scripts running on different domains, which defeats the purpose of using NoScript and balances security and usability that it once provided.\n\nIs there a way to block browser JavaScript from executing commands that retrieve sensitive information from my local machine, while still allowing JavaScript that is only used for rendering web pages?\n\nby sensitive information I'm referring to\n- local machine time\n- local machine ram\n- local machine operating system + version\n- local machine hardware\n- Serial Number\n- Hardware ID\n- UUID\n- Windows Device ID\n- Windows Product ID\n- ...\n\ngreatly appreciate any insight\n\n---\n\nEDIT: \n\ncould be possible solution\n\nhttps://discuss.grapheneos.org/d/16025-vanadium-and-what-to-use-on-desktop/19\n- ~~LibreJS: GNU LibreJS aims to address the JavaScript problem described in Richard Stallman's article The JavaScript Trap.~~\n- [JShelter](https://jshelter.org/\n): Mitigates potential threats from JavaScript, including fingerprinting, tracking, and data collection. Slightly modifies the results of API calls, differently on different domains, so that the cross-site fingerprint is not stable. Applies security counter-measures that are likely not to break web pages. Allows fine-grained control over the restrictions and counter-measures applied to each domain.\n\n---\n\n[@bjoern_tantau@swg-empire.de](https://swg-empire.de/u/bjoern_tantau) \n> Most of those things cannot be collected through JavaScript.\n> \n> Local time can.\n> \n> RAM can only be approximated to protect user privacy. Edit: And it’s not available on Firefox.\n> \n> OS+version are already in your browser’s user-agent string that is sent out with every request you make.\n> \n> Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.\n> \n> There is no way to get a serial number or similar.\n\nTo spoof timezone/OS+version/browser+version ... and disable WebGL, use https://sereneblue.github.io/chameleon/\n- https://lemmy.world/post/31885153\n","mediaType":"text/markdown"},"attachment":[],"sensitive":false,"published":"2025-06-23T12:28:02.039590Z","updated":"2025-06-23T21:26:25.399410Z","audience":"https://lemmy.ml/c/privacy","tag":[{"href":"https://lemmy.world/post/31859998","name":"#privacy","type":"Hashtag"}]},"cc":["https://lemmy.ml/c/privacy"],"type":"Update","audience":"https://lemmy.ml/c/privacy"},"cc":["https://lemmy.ml/c/privacy/followers"],"type":"Announce","id":"https://lemmy.ml/activities/announce/update/b35808a8-d3dc-422a-a6cd-3232833e8d7d"}
Response
Response Headers
Header | Value |
---|---|
cache-control | "no-cache, private" |
content-type | "application/activity+json" |
date | "Mon, 23 Jun 2025 21:27:11 GMT" |
x-debug-token | "c77a4c" |
Cookies
Request Cookies
No request cookies
Response Cookies
No response cookies
Session 1
Session Metadata
No session metadata
Session Attributes
No session attributes
Session Usage
1
Usages
Stateless check enabled
Usage |
---|
Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage:41
[ [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-core/Authentication/Token/Storage/UsageTrackingTokenStorage.php" "line" => 41 "function" => "getMetadataBag" "class" => "Symfony\Component\HttpFoundation\Session\Session" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/RememberMeAuthenticator.php" "line" => 69 "function" => "getToken" "class" => "Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authentication/AuthenticatorManager.php" "line" => 111 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\RememberMeAuthenticator" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AuthenticatorManagerListener.php" "line" => 34 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authentication\AuthenticatorManager" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/Debug/TraceableAuthenticatorManagerListener.php" "line" => 40 "function" => "supports" "class" => "Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/WrappedLazyListener.php" "line" => 38 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\Debug\TraceableAuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AbstractListener.php" "line" => 25 "function" => "supports" "class" => "Symfony\Bundle\SecurityBundle\Debug\WrappedLazyListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Security/LazyFirewallContext.php" "line" => 60 "function" => "__invoke" "class" => "Symfony\Component\Security\Http\Firewall\AbstractListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/TraceableFirewallListener.php" "line" => 80 "function" => "__invoke" "class" => "Symfony\Bundle\SecurityBundle\Security\LazyFirewallContext" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall.php" "line" => 95 "function" => "callListeners" "class" => "Symfony\Bundle\SecurityBundle\Debug\TraceableFirewallListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/WrappedListener.php" "line" => 116 "function" => "onKernelRequest" "class" => "Symfony\Component\Security\Http\Firewall" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 220 "function" => "__invoke" "class" => "Symfony\Component\EventDispatcher\Debug\WrappedListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 56 "function" => "callListeners" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/TraceableEventDispatcher.php" "line" => 139 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 157 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 76 "function" => "handleRaw" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/Kernel.php" "line" => 197 "function" => "handle" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/runtime/Runner/Symfony/HttpKernelRunner.php" "line" => 35 "function" => "handle" "class" => "Symfony\Component\HttpKernel\Kernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/autoload_runtime.php" "line" => 29 "function" => "run" "class" => "Symfony\Component\Runtime\Runner\Symfony\HttpKernelRunner" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/public/index.php" "line" => 7 "args" => [ "/var/www/kbin/kbin/vendor/autoload_runtime.php" ] "function" => "require_once" ] ] |
Flashes
Flashes
No flash messages were created.
Server Parameters
Server Parameters
Defined in .env
Key | Value |
---|---|
APP_ENV | "dev" |
APP_SECRET | "82ce1339a6c267e28d1f1dcb37a7454c" |
CORS_ALLOW_ORIGIN | "^https?://(kbin.localhost|127\.0\.0\.1)(:[0-9]+)?$" |
DATABASE_URL | "postgresql://kbin:917eaa3d703f19d123@127.0.0.1:5433/kbin?serverVersion=15&charset=utf8" |
HCAPTCHA_SECRET | "" |
HCAPTCHA_SITE_KEY | "" |
JWT_PASSPHRASE | "" |
JWT_PUBLIC_KEY | "%kernel.project_dir%/config/jwt/public.pem" |
JWT_SECRET_KEY | "%kernel.project_dir%/config/jwt/private.pem" |
KBIN_ADMIN_ONLY_OAUTH_CLIENTS | "false" |
KBIN_API_ITEMS_PER_PAGE | "25" |
KBIN_CAPTCHA_ENABLED | "false" |
KBIN_CONTACT_EMAIL | "kbin@j0h.nl" |
KBIN_DEFAULT_LANG | "en" |
KBIN_DOMAIN | "kbin.spritesserver.nl" |
KBIN_FEDERATION_ENABLED | "true" |
KBIN_FEDERATION_PAGE_ENABLED | "true" |
KBIN_HEADER_LOGO | "false" |
KBIN_JS_ENABLED | "true" |
KBIN_META_DESCRIPTION | "a private kbin install" |
KBIN_META_KEYWORDS | "kbin, content agregator, open source, fediverse" |
KBIN_META_TITLE | "Sprites kbin instance" |
KBIN_REGISTRATIONS_ENABLED | "true" |
KBIN_SENDER_EMAIL | "kbin@j0h.nl" |
KBIN_STORAGE_URL | "https://kbin.spritesserver.nl/media/" |
KBIN_TITLE | "/kbin" |
LOCK_DSN | "flock" |
MAILER_DSN | "smtp://spritesmods.com" |
MERCURE_JWT_SECRET | "231e9a1277f5585d52aa0b1e34c0f984xxxx" |
MERCURE_PUBLIC_URL | "https://kbin.spritesserver.nl/.well-known/mercure" |
MERCURE_URL | "http://localhost:3000/.well-known/mercure" |
MESSENGER_TRANSPORT_DSN | "doctrine://default" |
OAUTH_FACEBOOK_ID | "" |
OAUTH_FACEBOOK_SECRET | "" |
OAUTH_GITHUB_ID | "" |
OAUTH_GITHUB_SECRET | "" |
OAUTH_GOOGLE_ID | "" |
OAUTH_GOOGLE_SECRET | "" |
POSTGRES_DB | "kbin" |
POSTGRES_PASSWORD | "917eaa3d703f19d123" |
POSTGRES_USER | "kbin" |
POSTGRES_VERSION | "15" |
REDIS_DNS | "redis://uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v@localhost" |
REDIS_PASSWORD | "uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v" |
S3_BUCKET | "media.karab.in" |
S3_KEY | "" |
S3_REGION | "eu-central-1" |
S3_SECRET | "" |
S3_VERSION | "latest" |
Defined as regular env variables
Key | Value |
---|---|
APP_DEBUG | "1" |
CONTENT_LENGTH | "6379" |
CONTENT_TYPE | "application/activity+json" |
CONTEXT_DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
CONTEXT_PREFIX | "" |
DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
GATEWAY_INTERFACE | "CGI/1.1" |
HTTPS | "on" |
HTTP_ACCEPT | "*/*" |
HTTP_ACCEPT_ENCODING | "gzip" |
HTTP_DATE | "Mon, 23 Jun 2025 21:27:11 GMT" |
HTTP_DIGEST | "SHA-256=CqBjADSsyhWCNflNftBWRpND6tdRqpxvqjfc2jQ41GM=" |
HTTP_HOST | "kbin.spritesserver.nl" |
HTTP_SIGNATURE | "keyId="https://lemmy.ml/c/privacy#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="Q+dzCFt9iFNXcT/COl0WVseX8xnPzwf8i8YuMgVKEaGuSif5ka7Up8cppXQZoEeBxjBJjuM8bldnvSO3vOFX4WjFwidNo9U8BUU0+oQylVcOEcl0pXsC6S62cQCj5CRNTijz5f4ZRwH62iQgatRXmmX478jSRfnGjw3SbHWLd9/QEMmXHvq23zU3QNgngogPlZNTp+nOXyRYGOyZ0/VIs2QSYuIyjxY08VbUP7mYiQXNnnS/owXv3LCHW28SYvfR7UDVg5ZmUn8AhqgIsU7jsExpurHHkFnyu9xAz2bfxt9qrGVBzjSraV7J9EpQSSReE7VGyXm/oYnueD3pw+0osQ=="" |
HTTP_USER_AGENT | "Lemmy/0.19.12; +https://lemmy.ml" |
PATH | "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" |
PHP_SELF | "/index.php" |
QUERY_STRING | "" |
REDIRECT_HTTPS | "on" |
REDIRECT_SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
REDIRECT_SSL_CIPHER_ALGKEYSIZE | "256" |
REDIRECT_SSL_CIPHER_EXPORT | "false" |
REDIRECT_SSL_CIPHER_USEKEYSIZE | "256" |
REDIRECT_SSL_CLIENT_VERIFY | "NONE" |
REDIRECT_SSL_COMPRESS_METHOD | "NULL" |
REDIRECT_SSL_PROTOCOL | "TLSv1.3" |
REDIRECT_SSL_SECURE_RENEG | "true" |
REDIRECT_SSL_SERVER_A_KEY | "rsaEncryption" |
REDIRECT_SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
REDIRECT_SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
REDIRECT_SSL_SERVER_I_DN_C | "US" |
REDIRECT_SSL_SERVER_I_DN_CN | "R10" |
REDIRECT_SSL_SERVER_I_DN_O | "Let's Encrypt" |
REDIRECT_SSL_SERVER_M_SERIAL | "05BC012BFCA0DD2ABABFC84B9630E756CB3B" |
REDIRECT_SSL_SERVER_M_VERSION | "3" |
REDIRECT_SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_V_END | "Aug 27 21:01:45 2025 GMT" |
REDIRECT_SSL_SERVER_V_START | "May 29 21:01:46 2025 GMT" |
REDIRECT_SSL_SESSION_ID | "c8812036f2396ecb2ec1270ba8c504c33d5c4af9b7486e5f8d88480253e726d4" |
REDIRECT_SSL_SESSION_RESUMED | "Initial" |
REDIRECT_SSL_TLS_SNI | "kbin.spritesserver.nl" |
REDIRECT_SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
REDIRECT_SSL_VERSION_LIBRARY | "OpenSSL/3.0.16" |
REDIRECT_STATUS | "200" |
REDIRECT_URL | "/f/inbox" |
REMOTE_ADDR | "54.36.178.108" |
REMOTE_PORT | "53918" |
REQUEST_METHOD | "POST" |
REQUEST_SCHEME | "https" |
REQUEST_TIME | 1750714031 |
REQUEST_TIME_FLOAT | 1750714031.1662 |
REQUEST_URI | "/f/inbox" |
SCRIPT_FILENAME | "/var/www/kbin/kbin/public/index.php" |
SCRIPT_NAME | "/index.php" |
SERVER_ADDR | "5.9.62.165" |
SERVER_ADMIN | "webmaster@spritesmods.com" |
SERVER_NAME | "kbin.spritesserver.nl" |
SERVER_PORT | "443" |
SERVER_PROTOCOL | "HTTP/1.1" |
SERVER_SIGNATURE | "" |
SERVER_SOFTWARE | "Apache" |
SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
SSL_CIPHER_ALGKEYSIZE | "256" |
SSL_CIPHER_EXPORT | "false" |
SSL_CIPHER_USEKEYSIZE | "256" |
SSL_CLIENT_VERIFY | "NONE" |
SSL_COMPRESS_METHOD | "NULL" |
SSL_PROTOCOL | "TLSv1.3" |
SSL_SECURE_RENEG | "true" |
SSL_SERVER_A_KEY | "rsaEncryption" |
SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
SSL_SERVER_I_DN_C | "US" |
SSL_SERVER_I_DN_CN | "R10" |
SSL_SERVER_I_DN_O | "Let's Encrypt" |
SSL_SERVER_M_SERIAL | "05BC012BFCA0DD2ABABFC84B9630E756CB3B" |
SSL_SERVER_M_VERSION | "3" |
SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
SSL_SERVER_V_END | "Aug 27 21:01:45 2025 GMT" |
SSL_SERVER_V_START | "May 29 21:01:46 2025 GMT" |
SSL_SESSION_ID | "c8812036f2396ecb2ec1270ba8c504c33d5c4af9b7486e5f8d88480253e726d4" |
SSL_SESSION_RESUMED | "Initial" |
SSL_TLS_SNI | "kbin.spritesserver.nl" |
SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
SSL_VERSION_LIBRARY | "OpenSSL/3.0.16" |
SYMFONY_DOTENV_VARS | "KBIN_DOMAIN,KBIN_TITLE,KBIN_DEFAULT_LANG,KBIN_FEDERATION_ENABLED,KBIN_CONTACT_EMAIL,KBIN_SENDER_EMAIL,KBIN_JS_ENABLED,KBIN_REGISTRATIONS_ENABLED,KBIN_API_ITEMS_PER_PAGE,KBIN_STORAGE_URL,KBIN_META_TITLE,KBIN_META_DESCRIPTION,KBIN_META_KEYWORDS,KBIN_HEADER_LOGO,KBIN_CAPTCHA_ENABLED,KBIN_FEDERATION_PAGE_ENABLED,REDIS_PASSWORD,REDIS_DNS,S3_KEY,S3_SECRET,S3_BUCKET,S3_REGION,S3_VERSION,OAUTH_FACEBOOK_ID,OAUTH_FACEBOOK_SECRET,OAUTH_GOOGLE_ID,OAUTH_GOOGLE_SECRET,OAUTH_GITHUB_ID,OAUTH_GITHUB_SECRET,KBIN_ADMIN_ONLY_OAUTH_CLIENTS,APP_ENV,APP_SECRET,POSTGRES_DB,POSTGRES_USER,POSTGRES_PASSWORD,POSTGRES_VERSION,DATABASE_URL,MESSENGER_TRANSPORT_DSN,MAILER_DSN,MERCURE_URL,MERCURE_PUBLIC_URL,MERCURE_JWT_SECRET,CORS_ALLOW_ORIGIN,LOCK_DSN,JWT_SECRET_KEY,JWT_PUBLIC_KEY,JWT_PASSPHRASE,HCAPTCHA_SITE_KEY,HCAPTCHA_SECRET" |