Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.
morphballganon@mtgzone.com 1 week ago
Good start. Now make a version that clicks each ad a random number of times from randomly generated IP addresses.
GenosseFlosse@feddit.org 1 week ago
morphballganon@mtgzone.com 1 week ago
Sounds like a solvable problem
viking@infosec.pub 1 week ago
Chameleon add-on for Firefox, randomly rotates your browser, OS, screen size, timezone, device type, language, and other customizable parameters every x minutes.
I’ve set it to do so every 5 minutes, and to omit desktop & tablet as device types (else some websites display the respective page) and timezones (messed up 2FA).
I also disabled blackberry and windows phone from the manufacturer ID, that would have the opposite effect from obscuring me.
For the rest of it, it’s working great.
Psythik@lemm.ee 1 week ago
Tell me how, then, because I don’t know how to get around the font thing. Everybody’s computer has a different set of fonts, and blocking browsers from seeing what fonts you have installed would help identify you even more.
morphballganon@mtgzone.com 1 week ago
A browser extension that limits webpages to default Windows fonts only would eliminate that factor from contributing to identification without flagging it as suspicious. A slightly more robust version could frequently cycle between multiple subsets of default Windows fonts. Say Windows comes with 100 fonts. So you could have thousands of configurations with different subsets of those.
Cryophilia@lemmy.world 1 week ago
That one browser which everyone hates despite it being the best adblocker and anti-surveillance browser out there randomizes your fingerprint.
bss03@infosec.pub 1 week ago
“Just” remove a random 2.5% of the fonts, a different random set per request (context).
Tja@programming.dev 1 week ago
That’s not how IP addresses work.
yarr@feddit.nl 1 week ago
What if we use a Visual Basic UI to hack the IP address by netmask?
GenosseFlosse@feddit.org 1 week ago
Yes, but this only works if you connect your VPN via 3 block chain proxies.
madcaesar@lemmy.world 6 days ago
Make sure you’re behind a 54mghz ram modem firewall
j0ester@lemmy.world 6 days ago
Is it from this? youtu.be/hkDD03yeLnU
umbrella@lemmy.ml 1 week ago
maybe we can setup a botnet to poison advertiser data.
click all the ads, all over the planet!
lumony@lemmings.world 1 week ago
Why are you people so concerned about “the data?” Talk about missing the forest for the trees.
This is an effective tool to charge advertisers money without having their ads shoved in our faces. It directly undermines the integrity of the digital advertising ecosystem, and you people are obsessed with “privacy” because your priorities have been decided for you by your oppressors.
umbrella@lemmy.ml 1 week ago
what oppressors want me to worry about privacy?
SavageCoconut@lemmy.world 1 week ago
I liked your post ❤️
randamumaki@lemmy.blahaj.zone 1 week ago
Feed it SQL injections?
pebbles@sh.itjust.works 1 week ago
You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.
Tja@programming.dev 1 week ago
You need a TCP handshake prior to sending any http payload.
pebbles@sh.itjust.works 1 week ago
Oh yeah. Forgot about that.
lumony@lemmings.world 1 week ago
I can tell I’m getting old by the amount of proudly-dumb shit I keep reading.
It’s only going to get worse. Sigh.
pebbles@sh.itjust.works 1 week ago
I misremembered my internet class. Suck that it made ya feel bad.
Evil_incarnate@lemm.ee 1 week ago
Have it form connections to all the other browsers using the extension and they all send a click.
GreenKnight23@lemmy.world 1 week ago
IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com 1 week ago
“He who save his country does not violate the law”
some_designer_dude@lemmy.world 1 week ago
Naw, it’s an MMORPG.
Vanilla_PuddinFudge@infosec.pub 1 week ago
Is the botnet itself breaking the law or is breaking the law with a botnet breaking the law?
FiskFisk33@startrek.website 6 days ago
peer networks are not illegal if the peers are consenting members.
Lifter@discuss.tchncs.de 1 week ago
It just changes the user agent instead…
ILikeBoobies@lemmy.ca 1 week ago
Nothing is random
In bot cases like this you would have a proxy list that it “randomly” picks from
lumony@lemmings.world 1 week ago
No, he means that’s literally not how IP addresses work. It’s not about “nothing being random.”
You don’t just “pick an IP address” from a list lmao and send it as though it’s not your actual IP. You would need to literally connect to a proxy and send the request through that proxy in order for ads to see an IP different than you own.
My god, are you people trolls or just the next generation taking hold? The dumbing down of Western society is in full force.
ILikeBoobies@lemmy.ca 1 week ago
Yes that is what was proposed
Landless2029@lemmy.world 6 days ago
It does if it reports the URL to click home somewhere and users can opt in to pull the list to auto click.
It would DDoS the ad servers. Muwhahahaa
theherk@lemmy.world 6 days ago
Yes. That’s just what I want. An extension sending all ads served to me to a central location, so my fingerprint can be very easily indexed and stored on a definitely never hacked, leaked, or sold database.
Landless2029@lemmy.world 6 days ago
And it would totally never get abused or hit a false positive.
FiskFisk33@startrek.website 6 days ago
Totally doable if this was a distributed service