Main

related bits

0

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2024-09-18 14:00:38

expired found date

-

created at

2024-09-18 14:00:38

updated at

2024-11-04 21:25:04

Domain name statistics

length

6

crc

2924

tld

239

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

256482523

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

16408

mp size raw text

5729

mp inner links count

3

mp inner links status

10 (links queued, awaiting import)

Open Graph

title

description

das.gs

site name

author

updated

2026-03-01 22:24:55

raw text

das - Posthaven New Post Manage Logout Login Learn more about Posthaven What’s “Can’t be Evil”? When two or more parties are trying to collaborate around data, traditional Data Protection solutions do not ensure that a user of the data cannot abuse the data. There are however ways to provably ensure that data abuse cannot occur. Data Protection ≠ Data Privacy Data Protection and Data Privacy are distinct problems requiring different solutions. What is Data Protection? Data protection implies protecting your data from other parties that have access to the same resources. For example, in a shared server context where a cloud vendor is allowing multiple parties to rent partial virtual access to the same physical hardware, data protection solutions are essential to make sure that sensitive data being processed is not exposed to other renters of that same physical hardware. Typical data protection solutions are Confidential Compute solutions (like TEEs), Homomorphic Encr...

Text analysis

redirect type

30 (window.location)

block type

0 (no issues)

detected language

1 (English)

index version

1

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4664

text words

868

text unique words

352

text lines

42

text sentences

51

text paragraphs

11

text words per sentence

17

text matched phrases

0

text matched dictionaries

0

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-