💾 Archived View for nicholasjohnson.ch › 2023 › 07 › 04 › re-bullshit-js captured on 2023-09-28 at 15:56:07. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-07-22)

➡️ Next capture (2023-11-04)

🚧 View Differences

-=-=-=-=-=-=-

 _  _ _    _        _              _     _                      
| \| (_)__| |_  ___| |__ _ ___  _ | |___| |_  _ _  ___ ___ _ _  
| .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \ 
|_|\_|_\__|_||_\___/_\__,_/__/  \__/\___/_||_|_||_/__/\___/_||_|

🔗 Return to homepage

📆 July 4, 2023 | ⏱️ 1 minute read | 🏷️ computing

Re: bullshit.js

People in advertising[1], marketing, SEO[2], and other bullshit industries have littered the web with phrases that sound significant but don't actually communicate anything.

A while back I discovered this amusing JavaScript program called bullshit.js[3] which you can run in the browser to replace some of that marketing BS with the word "bullshit".

The official bullshit.js webpage includes a bookmark link which is vulnerable to xss[4]. Here's my patched version:

javascript:(function(){var d=document,s=d.createElement('script');s.crossOrigin='anonymous';s.integrity='sha256-J3uYBSO4XnmUCTfYH458SPL2Cp+wlPOnt64DreZjAtw=';s.src='https://unpkg.com/@mourner/bullshit@1.2.0/bullshit.js';d.body.appendChild(s);}())

Enjoy.

References

🔗 [1]: Fuck Advertising

🔗 [2]: SEO

🔗 [3]: bullshit.js

🔗 [4]: Cross Site Scripting Attack

Copyright 2019-2023 Nicholas Johnson. CC BY-SA 4.0.