• This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn more.

Lack of interest disable sending images (IMG tag) in conversations...

topcat

Well-known member
#1
unless I have missed this option and its already there,

as the title says, I would like the option to disable sending images in pm's

is there an easy way to do this with temp edit??
 

topcat

Well-known member
#3
not the same, even if attachments are disabled in conversations it doesn't stop people from clicking the insert image icon and inserting an image into a conversation

Without being able to disable this function, its possible for members to obtain ip's of other members very easily.
 

Amaury

Well-known member
#4
not the same, even if attachments are disabled in conversations it doesn't stop people from clicking the insert image icon and inserting an image into a conversation

Without being able to disable this function, its possible for members to obtain ip's of other members very easily.
By inserting an image, it's possible for others users to obtain another user's IP address? Um... no. I don't see how that's even remotely possible.
 

AndyB

Well-known member
#5
unless I have missed this option and its already there,

as the title says, I would like the option to disable sending images in pm's

is there an easy way to do this with temp edit??
Is there a particular reason you want to disable the [i m g] code in Private Conversations?
 

topcat

Well-known member
#10
yes just done is to Amaury lol

only way to stop it is to give option to disable img code in conversations.

then with it disabled from usergroup permissions if some one wanted to send an img they would have to type the url and it would be up to the person recieving the pm whether they wanted to visit that url or not, but it would be at their own risk and probably if they trusted the sender
 

Jeremy

Well-known member
#12
Its not really an exploit; you are accessing a file from a server (be it an attachment or located elsewhere), your IP address will most likely appear in the server access log. That is standard on pretty much every server.
 

topcat

Well-known member
#14
Its not really an exploit; you are accessing a file from a server (be it an attachment or located elsewhere), your IP address will most likely appear in the server access log. That is standard on pretty much every server.
true but on vbulletin you can disable the img tag in pm's

never said it was an exploit just asked for the option to disable the img tag for x usergroup
 

SignTorch

Active member
#16
an image can be any script that returns an image header and image data, the viewer sees the image, the script can see the viewer's IP.... that's why many email readers don't show images without viewer approval
 

psTubble27

Well-known member
#17
an image can be any script that returns an image header and image data, the viewer sees the image, the script can see the viewer's IP.... that's why many email readers don't show images without viewer approval
Isn't it much simpler than that? You could do it with the regular image, which the victim would request to show and the host would record what IP the request came from. That's probably the more straightforward reason why most mail clients prevent image-loading unless approved.
 

SignTorch

Active member
#18
No it can't be any simpler.
Code:
fclose(fwrite(fopen("my-IP-stash.dat","a"),"\r\n{$_SERVER[REMOTE_ADDR]}"));
 header("content-type: image/gif");echo(file_get_contents("the-image.gif"));
IP recorded....
 

sonnb

Well-known member
#20
I think you could request a custom addon for it. Many man, many mind. IMO, I am not happy if I even cannot insert an image in the PC.