Trivial? What information does this whitelist hold that can’t be spoofed? It’s not like apps have to tell the truth about what they are.
Comment on YouTube’s ad blocker crackdown now includes third-party apps
metaStatic@kbin.social 7 months agoexactly, it would be trivial to have a whitelist server side and now only ad friendly apps can access the videos. they only still work because it's worth keeping those viewers in the system for the time being.
Feyd@programming.dev 7 months ago
wreckedcarzz@lemmy.world 7 months ago
People do that? Just have their code go on the internet and tell lies?! This is a Christian internet!
(yes it’s /s)
passepartout@feddit.de 7 months ago
This is what current implementations like Revanced do. The endgame will be fullblown DRM. Until then, it will be a cat and mouse game.
eluvinar@szmer.info 7 months ago
exactly, it would be trivial to have a whitelist server side and now only ad friendly apps can access the videos. they only still work because it’s worth keeping those viewers in the system for the time being.
It’s not trivial to make sure over the network on a device you don’t control that you’re talking with an app you think you are talking with. Just look how multiplayer games fail to combat cheaters and resort to kernel anticheats, and then still fail to assure the players are actually using the legit application. It’s actually pretty much impossible in any open ecosystem, maybe possible on something like chromecast where you get to control almost anything (as long as someone doesn’t hack it to run custom firmware, like they do with every console ever).
mp3@lemmy.ca 7 months ago
Technically NewPipe simply parses the website and is seen as a web browser from YouTube’s point of view.
That how they bypass the API’s TOS, they don’t use it.