this post was submitted on 02 Apr 2025
881 points (100.0% liked)

Technology

71146 readers
4322 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

It garbles advertisers' data as a result, but you must disable uBlock Origin to run it; they can't work simultaneously. I recently moved to it and, so far, am never looking back!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 63 points 2 months ago (7 children)

That's not how IP addresses work.

[–] [email protected] 24 points 2 months ago (2 children)

What if we use a Visual Basic UI to hack the IP address by netmask?

[–] [email protected] 10 points 2 months ago (1 children)

Yes, but this only works if you connect your VPN via 3 block chain proxies.

[–] [email protected] 4 points 2 months ago

Make sure you're behind a 54mghz ram modem firewall

[–] [email protected] 11 points 2 months ago* (last edited 2 months ago) (2 children)

You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.

Edit: I was corrected. The TCP handshake requires you to have a valid IP you can respond from. So even though you can fake your IP, you can't use that to talk to most websites.

[–] [email protected] 18 points 2 months ago (1 children)

You need a TCP handshake prior to sending any http payload.

[–] [email protected] 6 points 2 months ago

Oh yeah. Forgot about that.

[–] [email protected] 11 points 2 months ago (2 children)

Have it form connections to all the other browsers using the extension and they all send a click.

[–] [email protected] 1 points 2 months ago

It just changes the user agent instead...

[–] [email protected] 6 points 2 months ago (1 children)

Nothing is random

In bot cases like this you would have a proxy list that it “randomly” picks from

[–] [email protected] 4 points 2 months ago (1 children)

It does if it reports the URL to click home somewhere and users can opt in to pull the list to auto click.

It would DDoS the ad servers. Muwhahahaa

[–] [email protected] 7 points 2 months ago (1 children)

Yes. That’s just what I want. An extension sending all ads served to me to a central location, so my fingerprint can be very easily indexed and stored on a definitely never hacked, leaked, or sold database.

[–] [email protected] 2 points 2 months ago

And it would totally never get abused or hit a false positive.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

Totally doable if this was a distributed service.

ok not randomly generated, but you know