Online SAS hosting spammers

I’ve been getting “Property Spam” recently with subject lines like “A showcase of great properties on the Costa del Sol” or “Achieve high rental yields in an up-and-coming UK city”.

These are sent to addresses that have never signed up to any mailing list (but have been sent spam in the past and would be on spammers’ lists). These spammers are hosted by Online SAS and have a very slick operation (reverse DNS records, SPF records, DKIM, “clean” domain names typically registered ~6 months ago). The emails have no contact details, just a tracking link to receive a brochure.

I complained using Online SAS abuse form and just got this:

Good afternoon.
My apologies for the interruption
We have removed James from any future mailing
Thank you

Steve Wroblewski

Is that this Steve Wroblewski on LinkedIn?

The domains are all registered on Namecheap and the websites just seem to be phishing exercises as the homepages are blank. An example site is (deliberately left unlinked).

Anyway, the spam continues as they are using multiple Online SAS servers and fresh domains. Strangely the servers never appear in any RBLs either.

Bloom – HTTP REST API caching middleware

Bloom is a REST API caching middleware, acting as a reverse proxy between your load balancers and your REST API workers.
It is completely agnostic of your API implementation, and requires minimal changes to your existing API code to work.
Bloom relies on redis, configured as a cache to store cached data. It is built in Rust and focuses on stability, performance and low resource usage.

Getting peaclock to build on Ubuntu 18.04

Peaclock uses C++17, this requires us to go through some hoops.

sudo apt install clang-7 llvm-7-dev
git clone
cd peaclock
export CC=/usr/bin/clang-7
export CXX=/usr/bin/clang++-7
find . -type f -exec sed -i -e \ 
's#std::filesystem#std::experimental::filesystem#g' {} \;
find . -type f -exec sed -i -e  \
's#<filesystem>#<experimental/filesystem>#g' {} \;
find . -type f -exec sed -i -e \
's/lexically_normal().//g' {} \; # HACK!