It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!
It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!
That’s not how IP addresses work.
maybe we can setup a botnet to poison advertiser data.
click all the ads, all over the planet!
Feed it SQL injections?
What if we use a Visual Basic UI to hack the IP address by netmask?
Yes, but this only works if you connect your VPN via 3 block chain proxies.
Make sure you’re behind a 54mghz ram modem firewall
Is it from this? https://youtu.be/hkDD03yeLnU
Have it form connections to all the other browsers using the extension and they all send a click.
now you’ve broken the law by creating a botnet.
“He who save his country does not violate the law” 😏
Naw, it’s an MMORPG.
Is the botnet itself breaking the law or is breaking the law with a botnet breaking the law?
I’m pretty sure it’s not a botnet until it’s used as one or the intent of it is to be used in the same way a botnet is used.
Okay okay, how about a counter that is updated with each user clicking on an ad, and the client can decide what they want to do with that information, totally not a botnet right?
It just changes the user agent instead…
Nothing is random
In bot cases like this you would have a proxy list that it “randomly” picks from
It does if it reports the URL to click home somewhere and users can opt in to pull the list to auto click.
It would DDoS the ad servers. Muwhahahaa
Yes. That’s just what I want. An extension sending all ads served to me to a central location, so my fingerprint can be very easily indexed and stored on a definitely never hacked, leaked, or sold database.
And it would totally never get abused or hit a false positive.
You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.
Edit: I was corrected. The TCP handshake requires you to have a valid IP you can respond from. So even though you can fake your IP, you can’t use that to talk to most websites.
You need a TCP handshake prior to sending any http payload.
Oh yeah. Forgot about that.