Jump to content

rawTOP

Administrators
  • Posts

    6,070
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by rawTOP

  1. Then there’s this position for fucking that keeps your faces 6+ feet apart with you breath expelled in opposite directions… Do that position outdoors with masks and it’d probably be pretty low risk. lol I did see one of the LA cumdumps post a video on Twitter of him taking loads in his back yard and looking for more. A quick outdoor pump n dump is probably pretty low risk — or could be depending on how it’s done.
  2. Just because you ask him to pull out, and he seems to pull out, doesn't mean he didn't blow half his load in your ass and the other half after pulling out. Pulling out is pretty low on the list of ways you can protect yourself from HIV.
  3. One point of clarification – this is not an alternative to PrEP. It's a different type of PrEP. Truvada was the first type of PrEP. Descovy was the second type of PrEP and now this injectable looks like it will be the third type. If Truvada works for you, stay on it. There's nothing wrong with Truvada for most people. It's a generic drug in most of the world and will be soon in the US. IMHO, in a world with sky-high medical costs, I don't think it's ethical to take a drug that costs $1000+/month when you could take one that's $50/month. Descovy is great for folks that have side effects from Truvada, and the injectable looks like it will be great for folks who keep missing pills (e.g. drug addicts). IMHO, the extra cost is warranted in those cases.
  4. If you're in a jurisdiction that requires disclosure of HIV status (I think that's the case in Ontario, but it's being challenged), then put it in your profile. If you're in a location that doesn't criminalize HIV (like NY) then do whatever you like. Honestly, if you're undetectable and can't infect them, it's really not any of their business (IMHO). That said, if asked a direct question about it don't lie – maybe evade the question, but don't say you're neg.
  5. Just so you guys know… I'm continuing to tweak the algorithm that's banning some of your IP addresses. Things that are typical of problem users put you on a really short leash. Things that are typical of good users increase what I let you do on the site before your activity looks too suspicious and I ban you. One of the most important things is to not block reCAPTCHA. I can't stress that enough. I use Google's reCAPTCHA v3 – it operates behind the scenes and tells me how likely it is that you're a bot. Bots know not to load reCAPTCHA (thinking no score is better than a bad score), so if you don't load it, then you look like a bot and you'll trip the algorithm very quickly and get banned. If your privacy controls block reCAPTCHA, then whitelist it. Otherwise you'll probably eventually get banned. If you do get banned, try again in 3-4 days. Most of the time the ban period is pretty short.
  6. So your IP address is banned. I’m locking this topic since it’s attracting discussion that has nothing to do with the original problem.
  7. Then it's not the same problem… How are you access the site now? Why do you think it's something other than a banned IP address?
  8. As I said above… if it's a 302 redirect, I need to know what URL is being redirected and what it's trying to redirect to. I can't diagnose "I'm having the same issue". The issue was never clearly defined.
  9. Not right now. But that will be possible on the sites I'm building. Just out of curiosity… How large are your video files? (I may have to increase the max upload size on my server.)
  10. Your IP address might be banned… I've got some ideas in mind to make that situation better, but won't be able to work on them for a few weeks. Though I did already start working on something related, but it's not done yet.
  11. When you click on the chat link, it passes your session ID here to the chat site. The chat site then looks up that session ID and validates it based on your IP address. Those are the two values in the error message you specified. In looking over the code, I did find one minor problem, but I don't know if it was the source of your problem. I had `id`=? AND `ip_address`=? when it should have been `id` LIKE ? AND `ip_address` LIKE ? Though I doubt that's the source of the problem. Another possible scenario is that you're on a cellular network that is frequently changing your IP addresses. So you start the session here on one IP, but by the time you go into chat you're on a different IP. In that case chat is correct not to let you in because to chat it appears you're a hacker who's stolen someone's session ID. If that's the problem, the way to get around that problem is to logout, login, and then go as quickly as practical into chat (before your network can change your IP). I keep promising a new chat system, and it really is pretty high on my to-do list. It's just I had to migrate servers before I wanted to, and now I'm having to deal with all the other stuff that's brought up (email issues, and a few other things that now have to get done by a certain date). So I'll get to chat as soon as those things are resolved – probably early next month. 🤞
  12. I've written something to clean up all the problem emails. So you may start seeing warnings that you need to update your email address. I was getting a lot of bounce notifications because quite a few of you had emails that went bad over the past 10 years. Either you stopped using the email that you used to sign up (a hard bounce), or your email inbox is full (a soft bounce). There are so many bad emails that if I did a mass email I'd get massacred because the various mail services would hate me for sending a lot of bad emails all at once. So I'm just going to discover them as they trickle out through "transactional" emails – for example if someone emails you through the site, or if you signed up for email notifications for threads, and those threads update. Hard bounces require you to revalidate your email address. Soft bounces simply turn off emails for a while and if they continue then they turn into a hard bounce. There is a third type of problem – if your email provider doesn't like us for some reason. Those will be handled as soft bounces. There are a quite a few different email blacklists. Those tend to be the reason why email providers decide they don't like us. I'll be monitoring them and trying to get off them if my server gets listed. I encountered one today that's affecting email to lycos.com and mailcity.com. I caught it pretty quickly so I think we're fine now. But the good part is that I'll now know about those problems pretty quickly. In addition, anyone who's banned from the site for 8 weeks or more will have their email address hard bounced, so when they come back to the site they'll need to revalidate their email. If you see a notification that you need to validate your email when you go into chat – that's a separate database and validations here don't count there. For now, don't worry about those messages – I'm still working on that system. And lastly, I 'm also monitoring the percentage of emails that get marked as spam on GMail. Apparently the threshold you need to stay below is 0.5%. In the last week I've just had one day above 0% and it was 0.2%, so we're fine there for now as well. If you want to help, mark Breeding Zone emails as "not spam" whenever you have the opportunity, especially if you're on one of the big mail providers like GMail, Yahoo!, or Outlook.
  13. ^^^ this ^^^ looks like a great risk reduction strategy. (The anal bottoms – not the oral bottoms.) Everyone's droplets stay on their side of the wall. Maybe put some walls up between the bottoms to further contain things. And then showers for everyone as they leave.
  14. I've turned off the DDoS protection. I'll turn it back on if we ever get a DDoS attack, but I can't see using it when there isn't an active attack. It should be off for everyone within ~5 minutes. I'm also waiting to hear from tech support to see if they have some convincing argument for keeping it on. Yeah, I could run it with fewer restrictions, but in that case, why bother running it at all? During an attack I don't mind a little inconvenience, but don't see the point when there's no actual problem.
  15. I disagree. As I stated initially I interact with very few people, and don’t interact with any high risk folks on a regular basis. Ethics, more often than not, is about choosing of the lesser evil. Having grown up in a fundamentalist “just say no” environment — that’s not the answer. Or, put another way, is life worth living if you deny yourself basic pleasures? As the article about the Dutch pointed out, we’re biologically programmed to need/want sex. The ethical choice in this situation is to not overindulge — to partake just enough to satisfy the need and have live a life that feels like it’s worth living. You also need to consider the risk vis-à-vis other acceptable risks you take every day. For example, if you drive a car there's a chance you could kill someone. Do you stop driving your car? All things being equal, SUVs are far more likely to kill people than sedans. Do you shame your friends who've bought SUVs? If you hit someone at 20mph there's a 10% chance you'll kill them. At 30mph there's a 50% chance. At 40mph there's a 90% chance. Which speed is the acceptable speed to drive? I picked those examples because the harm is to another person. Yet those are all considered "acceptable risks". Thanks to our Puritan ancestors (of our culture, if not genetically) to judge things involving sex more harshly than things that don't involve sex. But how many people die each year from car crashes when the driver didn't really need to make the trip or was going faster than really necessary? How is that different than going on a hookup where there's a small chance you might infect someone else with COVID?
  16. Please read the thread before posting!
  17. That’s a very old issue. It should have nothing to do with the recent changes.
  18. Fetish is actually one of the things that got people safely through the AIDS pandemic. Leather bars were super active hot spots. Flogging, mummification, piss, CBT, you name it… It was hot and kinky and pretty awesome. As much as I love breeding, I miss a good BDSM session.
  19. I suspect I know what’s happening. I’ll talk to the tech guys about it tomorrow.
  20. BTW… The Dutch government is suggesting people get fuck buddies… https://apple.news/AJRDeMOpmQbSI-YFPgU6rQQ Which is basically my point of getting a small group of trusted regulars. That will work for some, but not everyone. But every little but helps. [And AFAIK, the Dutch haven’t been very good about controlling COVID. In Europe I believe only the Swedes are worse…]
  21. They thought you were doing a SQL injection attack. Why, I don't know. They though you were an "automated client" (a spider/bot). I've put in a ticket that mentioned both of the instances.
  22. Did the post have links in it?
  23. You're correct – chat uses a different database. The name you see is the name you had when you first used chat. I was working on syncing the data a few weeks ago but got disrupted by the server migration. It's high on my list of things to do because chat is getting a major restructure. There will be multiple chat rooms each with a different theme (bb breeding, poz fetish, etc.) each chat room will be on a different site and you'll be able to set up profiles on those sites. The profiles will actually be interlinked – it's a network of sites that share a common database. So first I need the data sync'd, then I need to have at least basic (textual) profiles, then I'll open up all the new chat rooms. But there's some other stuff that needs to get done first (e.g. dealing with bouncing emails).
  24. It sounds like you might have your security settings too high. The first thing it does is "fingerprint" your browser. It then passes that to the site where chat is. And that site returns the number of people and sets a cookie in your browser. When you click on chat it needs that fingerprint value to authenticate that you're you. If you have your security settings too high the browser will deny the fingerprinting and everything else will fail.
  25. Just put in your profile that you're an airline employee, then it's disclosed and they can choose what they want to do. Since they're probably pretty anonymous encounters, maybe wear a full hood to protect the top since you're the biggest risk in the room…
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use, Privacy Policy, and Guidelines. We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.