Someone get that guy a better chair
Photographer steps inside Vietnam’s shadowy ‘click farms’ | CNN
Submitted 8 months ago by dominiquec@lemmy.world to technology@lemmy.world
https://edition.cnn.com/style/vietnam-farms-jack-latham-beggars-honey/index.html
Comments
wise_pancake@lemmy.ca 8 months ago
pastermil@sh.itjust.works 8 months ago
He could start by raising that seat a bit or he’s gonna get carpal tunnel before he get a strand of grey hair.
abhibeckert@lemmy.world 8 months ago
If it’s like my seat, the gas seal is probably stuffed.
bionicjoey@lemmy.ca 8 months ago
Dude’s gonna have praying mantis arms
megaman@discuss.tchncs.de 8 months ago
Pretty well lit for a shadowy place.
But holy shit those ergonomics. The desk is at their shoulders…
eclipse@lemmy.world 8 months ago
“They all looked like Silicon Valley startups,”
This hits too close to home.
GreatBlueHeron@lemmy.ca 8 months ago
It blows my mind that they need to do this with physical phones. I would have thought they could virtualise/emulate everything needed.
circuscritic@lemmy.ca 8 months ago
Software can detect the hardware it’s being run on, I imagine that mass traffic detected from x86, or emulated Android, would trigger fraud alerts.
Additionally, phones are cheap and use a lot less power then the x86 cluster required to replicate that many “individual” users/devices.
thedirtyknapkin@lemmy.world 8 months ago
On top of that, they pay these people so little that it’s cheaper to hire 50 of them for a year than to hire one person to run an operation like that for the same time.
smileyhead@discuss.tchncs.de 8 months ago
You can always spoof what software sees, but I guess this hackery development of spoofing tools would be more expensive than doing it on physical phones.
LostXOR@fedia.io 8 months ago
Yeah, I'd think it would be more cost effective to record the API requests the apps send and simulate those. No way the servers can tell the difference (unless they update the API or something).
abhibeckert@lemmy.world 8 months ago
API requests are usually encrypted with something along the lines of a JWT: jwt.io
If you don’t know the secret used to generate the HMAC signature (blue section of that website), then you can’t simulate the API request. And the secret is never transmitted.