Goodness, this could be my cat. I have a torty named Moosie that looks very similar.
Just here for good conversation with good people.
Goodness, this could be my cat. I have a torty named Moosie that looks very similar.
Thanks for the in-depth response!
Wie sagt man “Kadser” auf Englisch? Ich denke Katze aber mein Deutsch ist Amerikanisch. ☺️
I’m not sure they have the power to arrest Satan incarnate.
Apparently we’re running out of sand. That’s going to make the transition to glass harder. I’m not saying I don’t agree because I would definitely prefer glass than plastic.
Late reply here too. I’m sorry about that.
You can read my comment that I made here in regards to what I think could be causing you problems.
I do take this seriously and will try to find some time to put together a configuration like this for testing, so thanks for sharing.
Apologies for the late response!
I’ll echo similar thoughts to what I said in another comment. Librewolf, Mullvad, and other privacy based browsers are going to be a double-edged sword. You can take me with a grain of salt but these types of browsers actually do make you stand out in terms of fingerprinting. They have their own unique signatures, and the more you tweak the more you stand out too. Does it protect your privacy? It’s really hard to tell, there’s no data to suggest one way or another that I’m aware of. But, these changes are going to make you more likely to be challenged by captcha and blocked by sites in general.
I wish we didn’t have to try and solve this type of problem. Privacy should be a right.
Thanks for sharing that!
Truthfully, Firefox is fairly easy to detect. Several facets of the API it uses makes for quick identification. For example, Firefox should be able to report its build ID. Also, it won’t report specifics about the WebGL renderer you’re using like the vendor and architecture.
The link you shared is great and really highlights something I was thinking about today regarding this subject. The more you harden and change things the more you stand out. You’re also more likely to trigger bot detection when you alter specifics about your browser like the major version you’re on. I’ve seen some extensions change the user agent to much older major versions like Firefox 60. That’s a big red flag.
The user agent thing was bizarre, especially since it was also on Minecraft.net! I swapped to a generic Chrome on Windows agent and it instantly started working again and let me use the site as normal again.
Yes that is bizarre 😂 It’s not clear to me if Microsoft is using their own anti-bot solution or a third party one, but it doesn’t sound really successful with the way it’s reacting.
Overall, I can’t help but thinking the best route is to use the same thing as everyone else but roll your own VPN and change MAC addresses. Ideally, we would have some laws against all of this but I don’t foresee that anytime soon.
I wish I could do more to help. I’m happy to answer questions you might have, though.
I for one want to offer a heartfelt apology. As someone that works in this space, bots are becoming more and more sophisticated. I can’t speak for Cloudflare, but we’re definitely not interested in your personal information. As someone who also prefers their privacy on the web, the fact that bot signatures overlap with privacy-centric signatures sucks. I myself have experienced it on my mobile device with Ghostery. It’s frustrating, I know.
Would you mind sharing the guide you used for hardening your Firefox? I’m curious to see what could potentially be triggering the issue.
Also, I just want to say, I think it’s hilarious that a site blocked you but then allows you to continue browsing after changing your user agent. That right there is bot behavior.
To circle back around to the actual block, I bet changing your skin executes JavaScript which flags something from the anti-bot software.
Thanks for sharing this graph. Please forgive my pessimism regarding the subject. I know a lot of progress is being made in the area of renewables and sometimes it still feels dire. Hopefully we can hasten that downward trend with coal.
NYT also uses a third party bot identification and mitigation service.
Are you referring to email verification on sign up? If so, it’s unfortunately easily overcome by bad actors. Depending on how the platform handles it, one email can be used over and over again to verify accounts or there are many services out there that provide an endless amount of quick and easy emails. The automation of this has already been solved too. For the first scenario, limits on how many times an email is used for account verification is useful. For the second scenario, we really start the cat and mouse game. You can block sign up from accounts using spam email domains. There are lists out there that can help. If someone is really persistent, they may have a trove of legitimate email addresses they can use. Then you have to start considering where the sign ups are coming from, the IP, it’s reputation, the behaviors, and hopefully it’s fingerprints from the device. You could serve a captcha but most are trivial to bypass with code straight from GitHub or captcha passing services. Overall, this is not an easy problem to solve. I know a lot of conversation on Lemmy is being had regarding this topic. It’s going to take all of us together to help solve the problem.
Well done. I for one appreciate the effort you’re putting into making this a better place by keeping the bots out. Any thoughts on what can be done to keep bots from signing up to begin with or is the plan to continuously purge inactive accounts? I know from experience that a lot of these bad actors are going to pivot and redouble their efforts. This is unfortunately a cat and mouse game that will continually need to be addressed. But, again, thank you for your work on this!
There isn’t. This article is laughable because there is an astronomical amount of bot traffic that masquerades as legitimate human traffic. Things like puppeteer extra stealth and residential proxies have made it easier to hide a bots presence on the web. Also, the tracking they allude to via fingerprinting would very much be the same whether it’s a human solving a captcha or a seamless process where your browser solves one.
Ah yes, from Twitter to Shitter.
I guess if you can’t beat them it’s the next best thing.