It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!

  • morphballganon
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    4
    ·
    22 hours ago

    Good start. Now make a version that clicks each ad a random number of times from randomly generated IP addresses.

    • GenosseFlosse@feddit.org
      link
      fedilink
      English
      arrow-up
      16
      ·
      18 hours ago

      Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.

        • viking@infosec.pub
          link
          fedilink
          English
          arrow-up
          24
          ·
          17 hours ago

          Chameleon add-on for Firefox, randomly rotates your browser, OS, screen size, timezone, device type, language, and other customizable parameters every x minutes.

          I’ve set it to do so every 5 minutes, and to omit desktop & tablet as device types (else some websites display the respective page) and timezones (messed up 2FA).

          I also disabled blackberry and windows phone from the manufacturer ID, that would have the opposite effect from obscuring me.

          For the rest of it, it’s working great.

        • Psythik@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          15 hours ago

          Tell me how, then, because I don’t know how to get around the font thing. Everybody’s computer has a different set of fonts, and blocking browsers from seeing what fonts you have installed would help identify you even more.

          • morphballganon
            link
            fedilink
            English
            arrow-up
            10
            ·
            15 hours ago

            A browser extension that limits webpages to default Windows fonts only would eliminate that factor from contributing to identification without flagging it as suspicious. A slightly more robust version could frequently cycle between multiple subsets of default Windows fonts. Say Windows comes with 100 fonts. So you could have thousands of configurations with different subsets of those.

          • Cryophilia@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            1
            ·
            15 hours ago

            That one browser which everyone hates despite it being the best adblocker and anti-surveillance browser out there randomizes your fingerprint.

          • bss03@infosec.pub
            link
            fedilink
            English
            arrow-up
            3
            ·
            15 hours ago

            “Just” remove a random 2.5% of the fonts, a different random set per request (context).

      • yarr@feddit.nl
        link
        fedilink
        English
        arrow-up
        15
        ·
        17 hours ago

        What if we use a Visual Basic UI to hack the IP address by netmask?

      • ☂️-@lemmy.ml
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        20 hours ago

        maybe we can setup a botnet to poison advertiser data.

        click all the ads, all over the planet!

        • lumony@lemmings.world
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          4
          ·
          18 hours ago

          Why are you people so concerned about “the data?” Talk about missing the forest for the trees.

          This is an effective tool to charge advertisers money without having their ads shoved in our faces. It directly undermines the integrity of the digital advertising ecosystem, and you people are obsessed with “privacy” because your priorities have been decided for you by your oppressors.

      • Evil_incarnate@lemm.ee
        link
        fedilink
        English
        arrow-up
        8
        ·
        21 hours ago

        Have it form connections to all the other browsers using the extension and they all send a click.

      • ILikeBoobies@lemmy.ca
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        2
        ·
        19 hours ago

        Nothing is random

        In bot cases like this you would have a proxy list that it “randomly” picks from

        • lumony@lemmings.world
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          5
          ·
          18 hours ago

          No, he means that’s literally not how IP addresses work. It’s not about “nothing being random.”

          You don’t just “pick an IP address” from a list lmao and send it as though it’s not your actual IP. You would need to literally connect to a proxy and send the request through that proxy in order for ads to see an IP different than you own.

          My god, are you people trolls or just the next generation taking hold? The dumbing down of Western society is in full force.

          • ILikeBoobies@lemmy.ca
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            2
            ·
            edit-2
            17 hours ago

            You would need to literally connect to a proxy and send the request through that proxy in order for ads to see an IP different than you own.

            Yes that is what was proposed, you’re the only one who seems unclear on it

      • pebbles@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        6
        ·
        edit-2
        20 hours ago

        You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.

        Edit: I was corrected. The TCP handshake requires you to have a valid IP you can respond from. So even though you can fake your IP, you can’t use that to talk to most websites.

        • lumony@lemmings.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          5
          ·
          18 hours ago

          Just make a packet and overwite the IP field.

          I can tell I’m getting old by the amount of proudly-dumb shit I keep reading.

          It’s only going to get worse. Sigh.

          • pebbles@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            edit-2
            17 hours ago

            I misremembered my internet class. Sucks that it made ya feel bad.

            Edit: and you can put whatever you want as your source IP at the IP level. Though idk how modern security deals with that. I know I was taught that that was a way to DoS attack, so I imagine it’s protected against.

            • flux@lemmy.ml
              link
              fedilink
              English
              arrow-up
              3
              ·
              7 hours ago

              If you just do it on your own computer, the packet will be already dropped by your own gateway. You can fake whichever address in your local subnet, but those are very likely remapped anyway in your gw to the one given by your ISP.

              If you would have access to the switch port used by your ISP in the Internet exchange point (IX), you would have more liberties in choosing the IP.