• 2 Posts
  • 13 Comments
Joined 3 months ago
cake
Cake day: March 17th, 2025

help-circle
  • I don’t believe that to be very likely. The Russian botnets and the like don’t necessarily operate from within Russia. Furthermore, the article states major Russian ISPs, meaning this affects a lot of common people, but unlikely governmental instances.

    If the choice is between less propaganda for me, and less for them, I would choose the latter. I daresay the rest of us are much less susceptible to the propaganda than Russian citizens.

    Worst case scenario is that we get a case like North Korea, where the outside world cannot do anything that harms them without the government there being able to say to its citizens “See? We told you they were bad!”.




  • Yeah, a bit of an xy problem, I’ll admit. My ultimate goal would be invisible blocking/hiding from certain expected behaviors like the ones anti-adblockers employ. I’m not sure if what I have in mind specifically exists or not, but I find it fun to tweak and experiment with these kind of things. So I don’t necessarily have a problem I’d like to solve, it’s more an ask for directions/experiences.

    I have tried Fiddler before, and it almost has the capabilities I’m looking for (it replaces an entire file; nothing granular), but it was a bit of a hassle to get working well last time I tried it, with the CA certificate, decrypting the TLS and stuff.




  • I most likely am going a bit to the obscure/convoluted solution, yes.

    My goal is to do something to the effect of uBlock Origin, but instead of just blocking/hiding, either replace with local files, or intercept req/res in order to manipulate them favorably, without being detected. I don’t know what uBlock does under the hood though, apart from its resource blocking and CSS-derived hiding.

    Example:
    Watching a video on youtube, an ad is about to get loaded, but instead of the hiding/blocking strategy uBlock uses, intercept the GET/POST, save the important flags that are uniquely served to your device that would indicate that you have successfully been served the ad, drop the rest, and then answer with what would be a valid response for “I have watched the ad in its entirety”.
    So the server basically saying “Here, I give you this page and this script with both vital and ad contents. I now expect you to provide the corresponding hash that these two files will create through a series of functions. If you don’t, I will assume you’re blocking me, and I won’t provide further contents.”, and I’ll simply respond with “Here’s your hash! *wink*”.

    Essentially, I wish to experiment with trying to be completely invisible in the blocking, by providing responses as if I have loaded and watched the ad, with all anti-adblock implementations through scripts and dynamic loading “intact” and unaware.


    You’re quite right, I should include my goal in the post - editing it in now.




  • Depends on the conditions, I’d say. If you have an area that has low oxygen and high saline concentration, one could potentially preserve large parts of the carcass. A big challenge though is the substances brought by the carcass itself, like enzymes and bacteria that are not directly exposed to the oxygen-deficient saline-abundant water, which can thrive and remain active for a long period of time. However, if this carcass sinks to incredible depths, where the pressure is really high, temperature is a constant 4 degrees, very low concentration of scavengers or thriving organisms, and potentially sinks a bit into the sediment for a long time, you’ll essentially get pickle juice fossil fuel.




  • Depends on the level of technology you’re willing to go to:

    Smart phones today you’re probably all out of luck, whether it’s Google’s Android, Huawei’s HarmonyOS, or Apple’s iOS. Same with any desktop PC.
    Dumb phones without internet connectivity, like the Mudita Pure, can get you pretty far, but as you’re making calls and sending texts through your telecall provider, your provider might use that data for training purposes still.

    For other technological devices, like fitness trackers, TVs, cars, fridges, or any IoT device really, that somehow either connects to internet or syncs to a device with such capability (your phone) in order to phone home, you’re likely out of luck.
    Dumb devices, like mechanical timepieces, monitors, and “normal refridgerators” can get you pretty far, but remember that your purchases of these things, along with all the metadata of those purchases, might also be tracked and trained on.