New Blog post by me! Pre-compressing HTML to Brotli 11 using the #11ty build pipeline and serving via Cloudflare pages & a Cloudflare Worker #eleventy #webperf #perfmatters #cloudflare
https://nooshu.com/blog/2026/02/21/precompressed-html-at-the-edge-eleventy-meets-cloudflare-workers/
New Blog post by me! Pre-compressing HTML to Brotli 11 using the #11ty build pipeline and serving via Cloudflare pages & a Cloudflare Worker #eleventy #webperf #perfmatters #cloudflare
https://nooshu.com/blog/2026/02/21/precompressed-html-at-the-edge-eleventy-meets-cloudflare-workers/
attention to all #blind people using bsid-js. the overhaul from #gemini to #cloudflare #workers #ai is complete. the model we are using is@cf/meta/llama-3.2-11b-vision-instruct . this is more of an emergency overhaul because Gemini was not only taking too slow, but was pushing the limit of cloud flare workers, as cloud flare workers have time limits that must be met. also, if you see a command called /agree, don't worry about it. that was a one-time command I had to run to get it to agree to the meta licensing agreement. this is more of a beta. please test it, and make new commits if you find any problems. I'll be a bit active on this one. because, as promised, I have overhauled over to CF workers AI, and I will work on emergency patches. but overall, I want you (the devs) to be able to fix things yourself or add whatever features you are thinking of. like I said in a previous post, I will not be katering to your suggestions unless you add them yourself and then contact me to get your feature tested. but, as said earlier, I will fix things that keep the bot from running, and Gemini just so happened to be one of them fter a while. also, I'm keeping the /agree command just for people who want to run the bot with the same model. because you are required to agree to the licensing agreement meta has, and /agree is the only way to do so. so there ya go. overhaul complete. #cloudflare #cloudflareworkers #developers #ai public bot : https://discord.com/oauth2/authorize?client_id=1459622381961220110&permissions=1126176932350976&integration_type=0&scope=bot+applications.commands or https://blindsoft.net/apps.html
attention to all #blind people using bsid-js. the overhaul from #gemini to #cloudflare #workers #ai is complete. the model we are using is@cf/meta/llama-3.2-11b-vision-instruct . this is more of an emergency overhaul because Gemini was not only taking too slow, but was pushing the limit of cloud flare workers, as cloud flare workers have time limits that must be met. also, if you see a command called /agree, don't worry about it. that was a one-time command I had to run to get it to agree to the meta licensing agreement. this is more of a beta. please test it, and make new commits if you find any problems. I'll be a bit active on this one. because, as promised, I have overhauled over to CF workers AI, and I will work on emergency patches. but overall, I want you (the devs) to be able to fix things yourself or add whatever features you are thinking of. like I said in a previous post, I will not be katering to your suggestions unless you add them yourself and then contact me to get your feature tested. but, as said earlier, I will fix things that keep the bot from running, and Gemini just so happened to be one of them fter a while. also, I'm keeping the /agree command just for people who want to run the bot with the same model. because you are required to agree to the licensing agreement meta has, and /agree is the only way to do so. so there ya go. overhaul complete. #cloudflare #cloudflareworkers #developers #ai public bot : https://discord.com/oauth2/authorize?client_id=1459622381961220110&permissions=1126176932350976&integration_type=0&scope=bot+applications.commands or https://blindsoft.net/apps.html
It has been 0 days since I saw a threat actor depending on protection for their malicious activity from Cloudflare.
#threatintel #Cloudflare #FuckCloudflare
BEC phishing lure -> contiexpert[.]sg -> pub-cf549cc779d94e9ebb2f44e5579515a0.r2[.]dev/View-Pay-Details.html -> scrum.yiodrailoo[.]digital
It has been 0 days since I saw a threat actor depending on protection for their malicious activity from Cloudflare.
#threatintel #Cloudflare #FuckCloudflare
BEC phishing lure -> contiexpert[.]sg -> pub-cf549cc779d94e9ebb2f44e5579515a0.r2[.]dev/View-Pay-Details.html -> scrum.yiodrailoo[.]digital
#Cloudflare bietet eine Option, Webseiten für KI-Crawler in Markdown statt HTML auszuliefern. Das spart bis zu 80 Prozent Tokens und reduziert den Rechenaufwand beim Verarbeiten der Inhalte. KI-Agenten senden dafür den Accept-Header mit text/markdown. ich frage mich, ob Cloudflare den Kampf gegen KI-Bots damit aufgegeben hat. https://blog.cloudflare.com/markdown-for-agents/
X又掛了
剛在Misskey和Bluesky看到很多人回報,難道又是cloudflare的問題?
X又掛了
剛在Misskey和Bluesky看到很多人回報,難道又是cloudflare的問題?