zlacker

[parent] [thread] 4 comments
1. ashark+(OP)[view] [source] 2017-01-05 16:30:20
> The good thing of course is that it shows that they are afraid of such an extension.

Seriously. I'd figured they'd filter these "clicks" out easily server-side and didn't bother to install this thing, but this ban has hinted otherwise. I'll be installing it everywhere I can now.

replies(1): >>nine_k+76
2. nine_k+76[view] [source] 2017-01-05 17:01:40
>>ashark+(OP)
Why such "clicks" would be easy to filter on the server side? What distinguishes them so clearly?
replies(1): >>ashark+G6
◧◩
3. ashark+G6[view] [source] [discussion] 2017-01-05 17:05:00
>>nine_k+76
Well, tons of them coming from one IP address, on seemingly every site that address visits, for one thing.
replies(1): >>nine_k+fb
◧◩◪
4. nine_k+fb[view] [source] [discussion] 2017-01-05 17:27:35
>>ashark+G6
"One IP address" as in "the address of the same NAT box"?

With IPv6 it could work, or maybe with the local IP address passed by the script at click time, but the latter would be trivial to forge.

replies(1): >>ashark+tc
◧◩◪◨
5. ashark+tc[view] [source] [discussion] 2017-01-05 17:34:28
>>nine_k+fb
Sure, but most or all ads on every page visited by a given IPV4 address surely throws up red flags, NAT notwithstanding. And all this is assuming that the extension bypasses session tracking and makes resorting to IP address necessary in the first place.

Then again maybe it doesn't, since they bothered to ban this extension. They did seemingly more-or-less give up trying to sort spam search results from low-traffic but high-value sites a few years back, so I guess they can't algorithm their way out of every abuse problem.

[EDIT] all ads on some pages visited by a given IP over some shortish span of time, I should say, in the case of NAT.

[go to top]