diff --git a/internal/handlers/web/templates/index.jade b/internal/handlers/web/templates/index.jade index d8fb5e6..818f2af 100644 --- a/internal/handlers/web/templates/index.jade +++ b/internal/handlers/web/templates/index.jade @@ -20,12 +20,13 @@ block body input(type="file" name="file" multiple=false) button(type="submit") Upload section - p.center You can use cURL to upload a file: #[code curl -X POST -F 'file=@somefile.ext' https://upload.arav.top/]. + p.center You can use cURL to upload a file: #[code curl -F 'file=@somefile.ext' https://upload.arav.top]. + p.center Over I2P: #[code curl --proxy 127.0.0.1:4444 -F 'file=@somefile.ext' https://upload.arav.i2p] p.center A resulted link looks like this: #[code /f/base64rawURL(sha256)/filename.ext]. - p.center filename.ext could be anything but empty. It is a name the file will be retrieved with. + p.center filename.ext is mandatory. It is a name the file will be retrieved with. section h2 Privacy statements - p I WILL cooperate with law enforcements and provide them with logs. Abuses should be sent to #[a(href="mailto:admin@arav.top") admin@arav.top]. + p I WILL cooperate with law enforcements and provide them with logs, guess I shouldn't clarify why. Abuses should be sent to #[a(href="mailto:admin@arav.top") admin@arav.top]. p Upload logs include: access time, IP-address, name of a file it was uploaded with, a SHA-256 hash of the file, download name*, size of the file in bytes, User-Agent. p Each download also being logged and include: access time, IP-address, name of a file it was requested with, download name*, User-Agent. p *Download name is a salted SHA-256 hash of the file encoded using base64 raw URL encoding. The hash is being salted to make useless any attempt of bruteforcing. \ No newline at end of file