Well you can if you know the IPs that come in from but that’s of course the trick.
Comment on AI companies are violating a basic social contract of the web and and ignoring robots.txt
ricdeh@lemmy.world 8 months agoYou cannot simply block crawlers lol
echodot@feddit.uk 8 months ago
KillingTimeItself@lemmy.dbzer0.com 8 months ago
last i checked humans dont access every page on a website nearly simultaneously…
And if you imitate a human then honestly who cares.
bigMouthCommie@kolektiva.social 8 months ago
hide a link no one would ever click. if an ip requests the link, it's a ban
T156@lemmy.world 8 months ago
Except that it’d also catch out people who use accessibility devices might see the link anyways, or use the keyboard to navigate a site instead of a mouse.
bigMouthCommie@kolektiva.social 8 months ago
i don't know, maybe there's a canvas trick. i'm not a webdev so i am a bit out of my depth and mostly guessing and remembering 20-year-old technology
oatscoop@midwest.social 8 months ago
If it weren’t so difficult and require so much effort, I’d rather poison their data.
Clicking the link causes the server to switch to page content designed to fuck with a LLM.
HelloHotel@lemm.ee 8 months ago
Visiting
/enter_spoopmode.html
will choose a theme and mangle the text accordingly (think search&replace with swear words or santa clause)It will also show a banner letting the user know they are in spoop mode, with a javascript button to exit the mode, where the AJAX request URL is ofuscated (think base64) The banner is at the bottom of the html document (not nesisarly the screen itself) and/or inside unusual/normally ignored tags.
<script type=“spoop/text” style='display:block">you are in spoop mode</script>
T156@lemmy.world 8 months ago
Would that be effective? A lot of poisoning seems targeted to a specific version of an LLM, rather than being general.
Like how the image poisoning programs only work for some LLMs and not others.