banner
阿珏酱

阿珏酱

いつもとは逆の電車に乗り、見たこともない風景を見に行く
twitter
github
facebook
bilibili
zhihu
steam_profiles
youtube

Who is the Po main?

Tips: When you see this prompt, it means that the current article has been migrated from the original emlog blog system. The publication time of the article is too long, and the formatting and content may not be complete. Please understand.

Who is the Po main?

Date: 2018-6-25 Ajue Tutorial Views: 3215 times Comments: 1

Since I first used Weibo's cloud storage as the image storage library for the secondary element random API, many similar secondary element random APIs have emerged online. Among the ones I know, I selected a few to visit and found that many of the images are quite familiar. And the image links can also be found in my database, aren't these the ones I uploaded?
Are they all collecting mine?
Of course, words alone are not enough. Evidence is needed.
Then I selected ten API interfaces that I know, all of which are secondary element APIs stored in Sina Image Bed. I collected them on the server for a morning and collected nearly 100,000 images. After filtering out duplicates and invalid ones, there were only about ten thousand left. Surprisingly, it shows that the data of the ten interfaces are basically the same.
Then, by analyzing the uploaders of the links, among these ten thousand images, 75% of the images are from the Fantasy Domain Image Bed.
Although it is no secret that Sina image addresses can be recognized as Sina users.

Online demo address This is the js version, the code can be directly obtained by right-clicking
By identifying, it can be found that a large number of images in the API are from the Fantasy Domain Image Bed Weibo upload, which is uploaded by myself. Are those so-called APIs pirating mine? I know it in my heart.
image
Principle revealed:

Since the UIDs of the currently registered Weibo accounts are very large, the uploaded images are basically starting with 007, so the image below is randomly copied from an old account I found on Weibo
The link is https://wxt.sinaimg.cn/thumb300/ 9d0d09ably1fsn 7m0jyzzj20m80cidgm .jpg image

Get the file name 9d0d09ably1fsn7m0jyzzj20m80cidgm , the first 8 characters
 9d0d09ab
are converted to hexadecimal 2634877355 , which is the user UID
Then concatenate the Weibo user homepage address: https://weibo.com/u/+uid

image

If it appears like this http://wx1.sinaimg.cn/mw690/ 0072Vf1pgy1foxkfv4t7bj31hc0u018w .jpg , 005, 006, 007 at the beginning use base62 conversion
As for why this appears, it should be because the 8-digit hexadecimal cannot hold it. .
https://weibo.com/u/6456124939
image



User Comments:

image Long Xiaotian 3 years ago (2018-07-05)
Very interesting. Currently using an API, I don't know whose it is. I'm afraid it will become invalid. I'm also studying the implementation of Weibo Image Bed. I hope everything goes well~~

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.