Comment by indrora

Comment by indrora 2 days ago

5 replies

The problem is that increasingly, they are running JS.

In the ongoing arms race, we're likely to see simple things like this sort of check result in a handful of detection systems that look for "set a cookie" or at least "open the page in headless chrome and measure the cookies."

moebrowne 2 days ago

> increasingly, they are running JS.

Does anyone have any proof of this?

  • xena 2 days ago

    I'm seeing more big botnets hosted on Alibaba Cloud, Huawei Cloud, and one on Tencent Cloud that run Headless Chrome. IP space blocks have been the solution there. I currently have a thread open with Tencent Cloud abuse where they've been begging me to not block them by default.

    • ranger_danger a day ago

      I don't consider cloud IP blocks a solution. We use Amazon WorkSpaces, and many sites often block or restrict access just because our IPs appear to be from Amazon. There are also a good number of legitimate VPN users that are on cloud IPs.

utopiah 2 days ago

> increasingly, they are running JS.

I mean they have access to a mind-blowing amount of computing resources so to they using a fraction of that to improve the quality of the data because they have this fundamental belief (because it's convenient for their situation) that scale is everything, why not use JS too. Heck if they have to run on a container full a browser, not even headless, they will.

  • typpilol 2 days ago

    Chrome even released a dev tools mcp they gives any LLM full tool access to do anything in the browser.

    Navigate, screenshots, etc. it has like 30 tools in it alone.

    Now we can just run real browsers with LLMs attached. Idk how you even think about defeating that.