It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!

  • morphballganon@mtgzone.com
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    6
    ·
    2 months ago

    Good start. Now make a version that clicks each ad a random number of times from randomly generated IP addresses.

      • yarr@feddit.nl
        link
        fedilink
        English
        arrow-up
        23
        ·
        2 months ago

        What if we use a Visual Basic UI to hack the IP address by netmask?

      • ☂️-@lemmy.ml
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        2 months ago

        maybe we can setup a botnet to poison advertiser data.

        click all the ads, all over the planet!

      • Evil_incarnate@lemm.ee
        link
        fedilink
        English
        arrow-up
        11
        ·
        2 months ago

        Have it form connections to all the other browsers using the extension and they all send a click.

      • pebbles@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        7
        ·
        edit-2
        2 months ago

        You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.

        Edit: I was corrected. The TCP handshake requires you to have a valid IP you can respond from. So even though you can fake your IP, you can’t use that to talk to most websites.

          • pebbles@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            2
            ·
            edit-2
            2 months ago

            I misremembered my internet class. Sucks that it made ya feel bad.

            Edit: and you can put whatever you want as your source IP at the IP level. Though idk how modern security deals with that. I know I was taught that that was a way to DoS attack, so I imagine it’s protected against.

            • flux@lemmy.ml
              link
              fedilink
              English
              arrow-up
              4
              ·
              2 months ago

              If you just do it on your own computer, the packet will be already dropped by your own gateway. You can fake whichever address in your local subnet, but those are very likely remapped anyway in your gw to the one given by your ISP.

              If you would have access to the switch port used by your ISP in the Internet exchange point (IX), you would have more liberties in choosing the IP.

      • ILikeBoobies@lemmy.ca
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        2 months ago

        Nothing is random

        In bot cases like this you would have a proxy list that it “randomly” picks from

          • ILikeBoobies@lemmy.ca
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            3
            ·
            edit-2
            2 months ago

            You would need to literally connect to a proxy and send the request through that proxy in order for ads to see an IP different than you own.

            Yes that is what was proposed, you’re the only one who seems unclear on it

      • Landless2029@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        2 months ago

        It does if it reports the URL to click home somewhere and users can opt in to pull the list to auto click.

        It would DDoS the ad servers. Muwhahahaa

        • theherk@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          2 months ago

          Yes. That’s just what I want. An extension sending all ads served to me to a central location, so my fingerprint can be very easily indexed and stored on a definitely never hacked, leaked, or sold database.