Time to expand the void.
pixelcanvas.io
>go on phone (cell data, not wifi)
>place dot
>airplane mode off and on
>refresh page
>place another dot
Break through that fucking rainbow, lets be a noice team m8s
sounds good
>>734414789
UNITE EAST AND WEST VOID
TEAR DOWN THAT RAINBOW
how big is that canvas?
We need a Discord, will link in a sec
>>734414960
I've put @10000,10000 and there's people drawing out there.
So, big.
People are using bots to draw and repair their crap, so good luck.
>>734414521
co-ordinates?
what do you use to bot?
>>734415138
-100,60
-135, 60 at the moment. Ideally we take down the whole rainbow and text and reclaim the void over the centre of the map.
WE'RE MAKING PROGRESS
>>734415166
A simple script to click on screen coordinates and wait for cooldown. Can be done in autohotkey.
To fix the art it's a custom written image comparator. It takes a template and compares it to what's on screen and places dots only where it is different than template.
We cant get through that fucking Rainbow, but we do stand a good chance at that flag at 95, 26
>>734415284
No you're not, the bots are.
>>734414521
discord?
>>734414521
I think the site might be open to a spoof attack. It uses a GET request for placing the pixels.
im trying to see what i can make but i might need help. if you can, open up the debuger for your browser and go to networking, then place a pixel. there should be a outgoing request for https://www.google-analytics.com
copy the whole responce and resopnd with it. it should look like this:
https://www.google-analytics.com/r/collect?v=1&_v=j54&a=1297195936&t=event&_s=4&dl=http://pixelcanvas.io/&ul=en-us&de=UTF-8&dt=PixelCanvas.io&sd=24-bit&sr=1366x768&vp=1366x645&je=0&fl=25.0 r0&ec=Place&ea=3&el=-60,136&_u=KEBAAMABI~&jid=913287732&gjid=1717587387&cid=687773476.1496320601&tid=UA-97101332-1&_gid=404899424.1496320601&_r=1&z=2137439531
>>734416131
>I ain't clicking that shit, nigga!
>>734416242
you are not supposed to click it you are supposed to give me your version that you get when you click a pixel. if you don't understand it then don't do it.
>>734416131
https://www.google-analytics.com/r/collect?v=1&_v=j54&a=1099781903&t=event&_s=2&dl=http%3A%2F%2Fpixelcanvas.io%2F&ul=en-gb&de=UTF-8&dt=PixelCanvas.io&sd=24-bit&sr=1920x1080&vp=1920x988&je=0&fl=25.0%20r0&ec=Place&ea=11&el=-63%2C91&_u=KEBAAMABI~&jid=1017359473&gjid=208571373&cid=212553309.1496324188&tid=UA-97101332-1&_gid=1164505234.1496324188&_r=1&z=768454864
Thats what I got.
alright here is what i got the request is broken into variables separated by & symbols. here are the variables. if it has perenthencies then the variable changes if it does not then it is always equal to the right side of the equals sign.
v=1
_v=j54
a=(SESSION ID)
t=event
_s=(the Nth pixel made by this session id)
dl=http://pixelcanvas.io/
ul=en-us
de=UTF-8
dt=PixelCanvas.io
sd=24-bit
sr=(screen resolution)
vp=(also screen res but smaller?)
je=0
fl=25.0 r0
ec=Place
ea=(color id # starting from 0)
el=(grid pixel cords x,y)
_u=(might be the canvase id use "KADAAMABI~" for now)
jid=(UNKNOWN seems random and not dependent on anything)
gjid=(UNKNOWN seems random and not dependent on anything)
cid=(might be the true user id. persistent even after refreshing)
tid=(might be a time stamp / location identifier of some sort. persistent even after refreshing and across ips. use "UA-97101332-1" for now)
_gid=(visualy simmaler to cid but is not refresh persistent)
_r=1
z=(UNKNOWN seems random and not dependent on anything)
>>734416131
ttps://www.google-analytics.com/r/collect?v=1&_v=j54&a=984743958&t=event&_s=4&dl=http://pixelcanvas.io/@-364,-421&ul=en-gb&de=UTF-8&dt=PixelCanvas.io&sd=24-bit&
;^)
&je=0&ec=Place&ea=3&el=-417,-412&_u=KADAAMABI~&jid=1716448615&gjid=1130766994&cid=867623246.1496121927&tid=UA-97101332-1&_gid=1864669102.1496324764&_r=1&z=295673532
i think i got everything i need now. i just need to make a synthetic request and figure out how to get them to go through.
i understand some of these words you guys are saying
>>734421199
Roll