It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!

    • Landless2029@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      7 days ago

      It does if it reports the URL to click home somewhere and users can opt in to pull the list to auto click.

      It would DDoS the ad servers. Muwhahahaa

      • theherk@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        7 days ago

        Yes. That’s just what I want. An extension sending all ads served to me to a central location, so my fingerprint can be very easily indexed and stored on a definitely never hacked, leaked, or sold database.

    • yarr@feddit.nl
      link
      fedilink
      English
      arrow-up
      24
      ·
      8 days ago

      What if we use a Visual Basic UI to hack the IP address by netmask?

    • ☂️-@lemmy.ml
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      1
      ·
      8 days ago

      maybe we can setup a botnet to poison advertiser data.

      click all the ads, all over the planet!

    • Evil_incarnate@lemm.ee
      link
      fedilink
      English
      arrow-up
      11
      ·
      8 days ago

      Have it form connections to all the other browsers using the extension and they all send a click.

    • ILikeBoobies@lemmy.ca
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      8 days ago

      Nothing is random

      In bot cases like this you would have a proxy list that it “randomly” picks from

        • ILikeBoobies@lemmy.ca
          link
          fedilink
          English
          arrow-up
          10
          arrow-down
          3
          ·
          edit-2
          8 days ago

          You would need to literally connect to a proxy and send the request through that proxy in order for ads to see an IP different than you own.

          Yes that is what was proposed, you’re the only one who seems unclear on it

    • pebbles@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      7
      ·
      edit-2
      8 days ago

      You can fake your IP. There isnt really any authentication at the IP level. Just make a packet and overwite the IP field.

      Edit: I was corrected. The TCP handshake requires you to have a valid IP you can respond from. So even though you can fake your IP, you can’t use that to talk to most websites.

        • pebbles@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          edit-2
          8 days ago

          I misremembered my internet class. Sucks that it made ya feel bad.

          Edit: and you can put whatever you want as your source IP at the IP level. Though idk how modern security deals with that. I know I was taught that that was a way to DoS attack, so I imagine it’s protected against.

          • flux@lemmy.ml
            link
            fedilink
            English
            arrow-up
            4
            ·
            7 days ago

            If you just do it on your own computer, the packet will be already dropped by your own gateway. You can fake whichever address in your local subnet, but those are very likely remapped anyway in your gw to the one given by your ISP.

            If you would have access to the switch port used by your ISP in the Internet exchange point (IX), you would have more liberties in choosing the IP.