|Frequently Asked Questions|
|What is an imageboard?|
An imageboard is a type of discussion board where users share images and text about various topics.
The primary difference between imageboards and traditional forums is that anybody can make a post without registering an account or providing any personal information. This lowers the barrier to entry, protects user identities and focuses on what is said, rather than who says it.
|||spoiler text||||spoiler text|
|``` code block ```||code block|
|`inline monospace`||inline monospace|
|How do I make my own board?|
Register an account, then create a board. Please avoid making excessive amounts of boards, duplicate or boards similar to an existing one unless you expect that many users will migrate to the new board for whatever reason e.g. tyrannical moderation.
|How do staff, users and permissions work?|
There are 5 levels of permissions on the site with 0 being the highest level of privilege and 4 the lowest. In this list "Regular user" refers to somebody who is either not logged in or is not owner/mod of the board. For example if a user creates their own board, they do not have the "Board owner" permissions on other boards. Each board can have one owner and multiple moderators. Ownership can be transferred.
|How is the site run?|
|Who owns the site?|
An Australian guy called Tom. You can check the check the jschan repo for my discord and dig up more about me if you are curious. I also run some other projects including a large discord bot.Where is the server?
VPS in New York, USA.Who has access to the server?
Me (Tom) only.What OS does the server run?
Debian 9 minimal.How are IP addresses stored?
Jschan stores them hashed with a secret, and a substring of this is shown in ban pages and some moderation interfaces. Clear IPs are present in Nginx logs and retained for 7 days.Is the server secure?
Only ports 443 and 80 are open for HTTP(s) and one other port for SSH. Key only login is enabled and root login is disabled. The software is running as unprivileged users. MongoDB and Redis are configured to listen on local interfaces only and require authentication.So it can never be hacked?
I am not so naive to make that promise.I have an issue/found a vulnerability/need to contact you.
Issues with the software can be posted on the issues page or if you prefer not to use github, post on the meta board with a detailed description of the problem. For private matters or vulnerability reports, please contact me via email tom-69420-me.