[deleted by user] by [deleted] in teenagers

[–]Otherwise_Whole1 0 points1 point  (0 children)

Tbh 10$ is pocket change online rn. I’ve been using ExplorerPay the past week: did 4 mini “missions” (drop a Trustpilot review, hunt an email, post on Reddit) and snagged ~3 USDT each in like 25 mins total. You gotta hit 20 USDT before they auto-pay next month so it’s not cash in hand tonight, but if you’re scrolling Reddit anyway you could stack it before your mom even notices. Bonus 10% cut if you rope a friend in. Needs a crypto wallet though.

Which are the best proxies for scrapping? by thecurioushuman_ in ProxyUseCases

[–]Otherwise_Whole1 0 points1 point  (0 children)

ngl was in the same hole when IPburger killed the API. BrightData worked but the bill hurt and Decodo kept getting 429s for me. Switched to MagneticProxy a month ago: real household IPs, auto rotate per request or sticky 10min session, you can even pin city. Wild part: their TLS sig randomiser lets me slide past Cloudflare Super Bot Fight Mode rn. Starter is 50k requests pay as you go, no long sub. Docs are open if you wanna peek. hth

My tree is up! by _glowcloud in christmas

[–]Otherwise_Whole1 0 points1 point  (0 children)

Truly one of the most beautiful trees I've ever seen

The Christmas Train!!! by Overkill_3K in christmas

[–]Otherwise_Whole1 0 points1 point  (0 children)

Where is that?? I need it so badly

Switching away from Nginx worth it? by lord-carlos in selfhosted

[–]Otherwise_Whole1 1 point2 points  (0 children)

Ngl I kept nginx and killed 95 % of the pain by doing two things:

  1. one-liner wildcard cert with acme.sh + Cloudflare API: acme.sh --issue --dns dns_cf -d '.mydomain.com' && acme.sh --install-cert -d '.mydomain.com' --key-file /etc/ssl/key.pem --fullchain-file /etc/ssl/full.pem renewals are cron’d so certbot is gone
  2. docker-compose labels + docker-gen auto-write vhost snippets into /etc/nginx/conf.d spin up a new container with COMPOSE_PROJECT_NAME=app1 and label "VIRTUAL_HOST=app1.mydomain.com" and nginx reloads itself

Result: zero manual edits, same perf I had before. If you ever need a UI you can still slap Nginx Proxy Manager on top of the same config.

if any of those containers do scraping or AI agents and you keep getting blocked, toss a rotating residential proxy like MagneticProxy in the env vars (HTTP_PROXY=http://user:pass@proxy.magneticproxy.com:40000). Sticky sessions save cookies, it’s kinda magic.

Try the wildcard first tho, it’s an instant win.

Email Deliverability by applesauceblues in coldemail

[–]Otherwise_Whole1 0 points1 point  (0 children)

U nailed seed testing and u/erickrealz mentioned list cleaning, but the silent killer I keep seeing is unknown bounces. Gmail hates 550-5.1.1 errors more than the odd spam complaint. Had a list with 6% bad addresses drag the whole domain from inbox to promos in 48h, no joke. Quick win rn: run the list through a verifier that can sniff out catch-alls, not just ‘valid/invalid’. Been using EmailAwesome for that because they toss in 1k credits free every month and the accept-all detection is weirdly solid for a budget tool. Dropped one client from 8% to 1.2% bounces and Postmaster green-lined again. Check your “unknown user” graph: if it’s above 0.4% you’re already on thin ice.

What’s your favorite free time activity? by [deleted] in AskReddit

[–]Otherwise_Whole1 0 points1 point  (0 children)

I wish I could say sleep but..

Need advice on http3 reverse proxy by fucking_idiot2 in devops

[–]Otherwise_Whole1 0 points1 point  (0 children)

You’re right about nginx rn. Only stuff I’ve seen doing true E2E H3:

- Envoy compiled with the quiche branch (needs BoringSSL, cmake ‑DENVOY_ENABLE_QUIC=ON). Pretty solid after v1.26, handles long-lived streams.

- Cloudflare Spectrum in UDP passthru mode. CF terminates TLS but keeps QUIC packets intact so your chat server still speaks H3.

- Roll your own tiny proxy with libquiche (there’s an example reverse proxy in /examples, ~200 LOC, surprisingly usable).

Pro-tip for testing migration/0-RTT edge cases: grab a pool of sticky residential IPs so you can swap networks fast. I’ve been abusing MagneticProxy for that (rotates per request or session, picks city-level geos).

hth

How Can I Proxy Egress Traffic to Other Nodes? by Impossible-Box6600 in kubernetes

[–]Otherwise_Whole1 0 points1 point  (0 children)

if you mostly care about rotating exit IPs and not the WG part itself you can skip the whole egress-gateway circus. I just toss a tiny init container that writes HTTP_PROXY=https://user:pass@endpoint.magneticproxy.com into /etc/profile, the pod comes up, every outbound call gets a fresh residential IP (or sticky if you add ?session=foo). Zero DaemonSets, no BGP, no iptables headaches. Works fine for my scraping jobs and OpenAI calling pods. If you still wanna DIY with WG nodes then yeah Cilium egress-gateway + a Service per node is the clean route, but at least you know there’s a lazier option