Welcome to E-Hentai.org, the home of Free Hentai, Free Doujinshi, Free Manga, Free CG Sets, and Free H-Anime
Information
News & Updates
Wiki FAQ
User CP
Community
E-Hentai Galleries
E-Hentai Forums
The HentaiVerse
EHWiki
Content
Series: Doujinshi
Circle: Doujinshi
Hentaikey Movies
GT Signup/Login
Search
News & Updates
E-Hentai Forums
E-Hentai Classic
E-Hentai Galleries
EHWiki
J-List is a wonderful toybox of things from Japan - come see
@ehentai
8 days ago:One of the frontends decided to take a break. It's back up and running now.
11 days ago:The forum is back online, and the replica has been rebuilt. Going to do the wiki as well while I'm at it.
11 days ago:The forums will be briefly unavailable while I apply some updates and rebuild a broken replica.
13 days ago:Alright! I'm going to need everyone to grab your tits, then calm them. What you do with them afterwards is up to you.
Supporting your favorite artists
Posted Sat, 14 June 2014, 15:31 UTC by Tenboro
You may or may not have already heard of Patreon. Launched in 2013, this is a website that allows you to become the patron of one or more artists or content creators, by pledging either a fixed monthly amount, or an amount per released work up to a given limit per month. It has been gaining popularity lately, and is a great way to support your favorite artists and reward them for their hard work.

Crucially, unlike many other services traditionally used to send donations, Patreon does allow NSFW artists to use their service. While this will disallow PayPal as a payment option, credit cards are still an option for those who wish to support artists who create adult content.

You will find that some artists already have a Patreon link posted on their platform of choice, and more are adding it all the time. You can also search for specific artists on the site itself. And if the artist you want to support doesn't use it yet, you could always suggest that they check it out.

So if you have a few bucks to spare, and you want to support those who create the things you love, this is a great way to do it!
> Comment on this story (61 comments)
E-Hentai Galleries 0.301
Posted Sat, 03 May 2014, 13:53 UTC by Tenboro
(Internal changes only)

This patch builds on some of the changes from the maintenance the other day to add a new backend search for gallery names. The new system allows us to do full-text searches while still using indexed lookup for all name searches, which cuts the lookup time for a search terms that weren't previously indexable (primarily, those using non-roman letters and those that combined multiple terms with quotes) by a factor of somewhere between 25 and 50 - without decreasing the search accuracy in any way.

Early stats show that this change dropped the CPU load on the cluster nodes by about 30%, which is fairly significant.

If you spot any weirdness with name searching, make sure to post about it here.
> Comment on this story (126 comments)
E-Hentai Galleries 0.300
Posted Thu, 24 April 2014, 15:32 UTC by Tenboro
Because we never really have "major" versions.

- Added two additional viewing modes to the Multi-Page Viewer. In addition to the old left-aligned style, you can now also choose a center-aligned style without scaling, as well as a fit-to-width style that will scale up images to fit the full width of your browser window.

- Added an option to hide the MPV thumbnail bar.

- Both of these options can be changed from the right bar of the MPV, as well as under My Settings.

- Some functionality that was previously unavailable with the site in Read Only Mode, like more/large thumbnails, will now work.

Report any issues here.
> Commenting is closed (62 comments)
The OpenSSL Heartbleed Exploit And You
Posted Tue, 08 April 2014, 12:53 UTC by Tenboro
About half a day ago, there was bit of a bombshell dropped on the open source crypto-community, when it was announced that the extremely common OpenSSL cryptographic library was vulnerable to an information disclosure exploit, dubbed Heartbleed. Among other things, this library is frequently used to provide SSL/TLS (HTTPS) encryption for website traffic. The exploit would allow a remote unauthenticated attacker to disclose 64KB of random memory space on a server by triggering a flaw in how SSL/TLS heartbeats were implemented. Crucially, the attack could be repeated ad nauseam without producing anything suspicious in the logs until the desired information was obtained - most critically, the server's private certificate keys.

Vulnerable versions of the library have been widely deployed - about 2/3rds of the internet is powered by the technology in question, and you should assume that the majority of those use a vulnerable version, which has been available (and recommended) since March 2012. In the most common configurations, obtaining a server's private keys would allow an adversary to decrypt all traffic that has ever been transferred using the certificate in question - in other words, SSL/TLS encryption for a large number of sites has for all intents and purposes been broken for more than two years.

While we don't use encryption for most non-important stuff, our configuration for the parts that do have never been fully vulnerable to this attack. Prior to January of this year we were using an older version of OpenSSL that was not vulnerable. A new server using a vulnerable version of OpenSSL was deployed in January, but at the same time we also deployed Perfect Forward Secrecy, which generates fresh encryption keys per-session and therefore fully mitigates the decryption of historic and future traffic based on certificate keys. In other words, the only part of this we have ever been vulnerable to would have been an active Man-in-the-Middle attack, and I have no reason to believe this has taken place. Still, this should now be patched and no longer vulnerable, and I've reissued our certificates just to be safe. So while I don't think it's strictly necessary, if you subscribe to the Paranoid Approach to security, you may consider changing your password.

I still feel it is important to inform people that the majority of SSL/TLS traffic they have transferred over the internet for the last couple of years should be considered compromised, as if it was transferred in plain text. Perfect Forward Secrecy was only available at 6.3% of all HTTPS-enabled websites as per April 2014, so chances are high that any given site does not implement it. This doesn't just apply to websites, but everything that uses SSL/TLS, such as mail servers, chatting services and the Tor network. Furthermore, there is no way for a visitor to tell if a site has been or currently is vulnerable. For the foreseeable future, you should therefore assume that SSL/TLS is worthless as far as protecting your data goes, until the service in question tells you otherwise.

tl;dr: SSL/TLS (HTTPS) is broken, we're mostly not affected.
> Commenting is closed (77 comments)
Bitcoin Donations v2
Posted Fri, 07 February 2014, 16:03 UTC by Tenboro
The Bitcoin Donations page has now received a significant update. Instead of using a third party to handle the Bitcoin integration, the site now interfaces directly with the Bitcoin network to handle payments. This makes the process much more resilient to external failures, and allows us to do some new stuff that would be more complicated before.

With the new system, a Bitcoin wallet address will be generated for you where you can send coins from any online service or wallet on your computer or cellphone. As soon as they have been confirmed by the network, they will be available from that page to apply either as a direct donation or towards Adopt-a-Server slots. Any coins sent to your wallet will remain in your balance until they are spent in one of those ways.

Note that the available BTC balance shown on the page is what is available for you to spend, not the "actual" balance on the Bitcoin wallet in question - for security reasons, everything is transferred to a cold (offline) wallet shortly after being received.

To read more about Bitcoin, please check this thread.

Edit: To further insulate people from random BTC volatility, we now use the highest of the 24-hour and 7-day weighted average. This means that the impact of a large drop on any given day should be negligible as long as you don't wait too long to apply a transaction.
> Comment on this story (189 comments)
Dashboard
User:
Pass:
or Register
Random Pick
LOST MEMORIES
LOST MEMORIES
Find virtual love with Japan's amazing hentai dating-sims!