Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>leberschnitzel</span></a></span> shure. Take your time. </p><ul><li>Usually the most effective solutions are further away from said webserver.</li></ul><p>Espechally since <a href="https://infosec.space/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> gets universally blocked by users of <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> like myself simply because <em>every single piece of <a href="https://infosec.space/tags/JS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JS</span></a></em> I came across was not <em>"technically necessary"</em> if not outright <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> designed to do <a href="https://infosec.space/tags/Cryptojacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptojacking</span></a>, <a href="https://infosec.space/tags/BrowserFingerprinting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BrowserFingerprinting</span></a> and/or steal logins.</p>