Hacker News new | past | comments | ask | show | jobs | submit login

Sounds like it might make sense to drop this early hints feature (whatever it is).

I wonder how much longer it will be before the next major escalation happens with ad blockers. I can imagine mainstream browsers that fetch unmodified pages and click ads in the background (do subvert pay per click ad business models and make it harder to compute targeting metrics), but then display an ad/tracking-free version in a separate rendering pipeline.




As far as I know, current ad blockers can't block ads from Widevine (DRM protected) streams, so I guess it's only a matter of time until Chromium team comes up with Widevine for webpages and then it's game over for normal consumers.


Didn't they more or less try this with the Web Environment Integrity API? Luckily, people caught on quickly and caused enough backlash for them to abandon it - this time.

I'm not sure how things will work out the next time though.


At least we got some of my all-time favorite GitHub issues tho


Out of curiosity, could you post a couple?



While i know its evil, i always wished widevine was an option for creating captchas.

Most captcha solutions are defeated by services like 2captcha.net and generally aren't the most privacy respecting.


Most captcha solutions are also hard for me, but easy for computers to solve. So I really hope their use doesn’t get expanded even further…


"Select every tile with motorcycles", shows an image of a single motorcycle parked on the street. Does the sliver of a tire that shows up in the bottom right tile count, or not? This is never clear, and I end up usually getting it wrong until they show me one that's unambiguous.


"This is never clear, and I end up usually getting it wrong until they show me one that's unambiguous."

While those CAPTCHAs present a surface narrative of you having to get the problem correct, that's not how they really work. After all, it's not like they are creating those problems by hand. They're pushing the images through computers. You don't even know that what the CAPTCHA server considers correct is even close to objectively correct.

Really it's just a hook to engage you to collect a wide variety of streams to try to detect whether or not you are a human, like reaction speeds, how the mouse moves, etc. The correctness of your selection is only one small signal, and not even necessarily a large one.

The answer is, stop overthinking it. Your overthinking it is probably sending a signal that you're not a human because it's got all your timings wrong. Do what most humans do: Halfassedly click at the problem until it seems rightish and then click "Submit". Does the sliver of tire that shows up in the bottom right tile count? The human response to that question is "Who cares you dumb computer let me through to the content already", so, to maximize how human you look to the algorithm, channel your fellow human's feelings. If you feel frustrated at the CAPTCHA problem and wiggle your mouse angrily and maybe overshoot some of the squares you mean to click, so much the better and more human looking.


Interesting, I guess this explains why I can never "solve" the damn things on my desktop. I use an Ultimate Hacking Keyboard which has a mouse layer, so I control the mouse cursor with my keyboard. It means that my mouse always travels in either perfectly horizontal, perfectly vertical, or perfectly diagonal patterns, and at very different timings than a human using a traditional mouse would.

But, it pisses me off to no end that I can't use my fucking keyboard the way it is supposed to be used (which is a far superior design to the "normal" setup) to view some websites because it doesn't "look" human to the fucking server who expects me not to be a statistical outlier. As someone who has always been an outlier, I kind of hate the algorithmic future we live in and are headed even further toward. This is why we can't have nice things.


Gotta outsmart the algorithm by introducing some jiggle like at https://forum.ultimatehackingkeyboard.com/t/mouse-jiggler-ma...

The forum folks may be able to provide a solution.


Dude thank you! This is awesome :-)


> I can't use my fucking keyboard the way it is supposed to be used (which is a far superior design to the "normal" setup)

Surely this is just your preference and the setup isn't objectively better. I can see see some people prefer moving a mouse with a keyboard but they likely wouldn't be as quick/precise as people with an actual mouse.


a tutorial on how to be human on internet


Putting Expert Human on my resume now, thanks.


The last time I got blocked by captcha I went through a dozen of them in a row before being told I wasnt human enough (possibly true after 30 years in IT!) and so on principal I reject all websites that include captcha. And anyway, why are we training these image recognition tools for free.


Were you trying to access archive.is using the CloudFlare DNS resolvers?


I used to have an internet connection from a small ISP that used carrier grade nat. Same issue. I think most of these captcha systems basically just look at IP or other reputation, and then make end-users do mechanical turk style work for free.

Someday, I'm hoping some sociologists look for evidence of socioeconomic discrimination in captcha implementations.

In my experience, performing the exact same actions with your mouse in Mountain View leads to a completely different outcome than it does in lower income areas (red-voting white, ethnic minorities, etc) surrounding the Bay Area.


I have never successfully gotten a “click all motorcycle squares” to succeed. With a VPN, nothing usually works until “click until there are no more X.” It’s so consistent that I’m pretty sure it’s designed that way, since the final task is time-gated.


> With a VPN, nothing usually works until [...]

Bots are very likely to use VPNs, so captcha services make things a real pain in the ass for anyone connecting from a VPN.

It's the same story with Tor. Coming from a VPN/Tor is a strong signal that you're more likely to be a malicious user.


I'm guessing they also use failed CAPTCHA statistics as more "proof" that those users are malicious. How much should we bet that each time I fail a CAPTCHA because it's utter shit, and happen to be on a VPN, somebody somewhere counts it as a "blocked bot" or "blocked attack"? I guess I don't want to know as it will probably make me angry.


ReCaptcha will serve you impossible captchas (as in it will always behave as incorrect even if the answer is correct) if it doesn't like you.


I've had 'click all the lettuces' - it told me I was wrong for not clicking on a cabbage


It's not comparing your response to some hard truth, it's comparing your response to a typical response. Sort of like how LLMs dish stuff out based on what's probable, not based on hard truth.

So when you fail, it's not really saying you're wrong, it's saying you're not like most.


I'm not helping. I always try to get a few wrong just to screw with their training.


On these captchas I used to sweat it but now I just think "fuck it" and don't overthink anything. And I always pass, perhaps for a variety of reasons secondary to the actual tiles selected


Which is mostly because computers are good at solving them. A DRM based captcha wouldn't have that issue in theory.


Widevine has already been reverse engineered. You just need to extract a device private key and there are numerous methods for doing so. "Web Environment Integrity" will never work.


It will not work to prevent someone from copying a webpage.

It will work to make ad-blocking difficult enough that most people don't bother anymore.


Widevine (or any other DRM-based "proof of human" solution) would be far less compute-freedom and privacy respecting than a captcha.

Hashcash[1] was invented two and a half decades ago and is still the best solution. It doesn't require manual work or user privacy invasion and deters mass spammers.

[1] https://en.m.wikipedia.org/wiki/Hashcash


Captchas can be forwarded to other people. Think of things like VNC.


I'd prefer to see proof-of-work based captchas. I'd much rather give up 10 minutes of CPU time for a token that can be revoked as soon as I actually use it for evil than give up all of my privacy (and two minutes of my personal time) for the privilege of using your annoying website.


Proof of work captchas are pretty hard to tune. You need it high enough to deter spammers (who can pre-compute and dont care about latency), but low enough not to deter real users on low powered devices who are using your site live and get more frustrated every second they have to wait.

It might work for spammers who really are just making billion of attempts, but then again if they are making that many attempts then you can block on the IP level.


This is basically how Apple does things. Instead of proof of work, they bake the tokens into devices.

The basic idea is that they'll happily let you sneak a few spam messages through iMessage if you're willing to spend a few hundred dollars on a burner iPhone. This is one reason why they're so resistant to allowing gateway protocols between iMessage and third party devices or RCS.


That is what those Cloudflare "checking your connection before proceeding" page is doing.


Spammers would actually prefer it I think. I think for each captcha solved, spammer are ready to pay more than real users(be it electricity or real money). They were already paying real humans before AI became good enough for solving captcha.


Spammers are probably not using their own computer or electricity, so this would be very attractive for them.


No, it would not. Spammers are still paying for the devices - most botnets are built and used (to spam) by different actors. Systems that require more computational power to spam take up more of their resources, making spamming significantly less profitable.


Depends on how much do you want real users to spend per captcha in electricity cost? If say it is $1/captcha it would be untenable for real users. If it is 0.01 cent, it wouldn't hurt spammer's margins.


Yes, $1/captcha is clearly infeasible - it'd be far too slow, first of all.

I don't have any knowledge of what spammers' financials are like, but it's possible that even 0.01c/captcha would still be impactful if the click rate is low enough.

Probably the best way to start tuning the PoW difficulty is just by starting out with what users are willing to tolerate - e.g. 3s solve time on the median mobile device. The gap between mobile and desktop devices has significantly lessened over the past decade, so desktop-grade equipment won't have that much of an advantage - say 1s per captcha, which is a lot for a spammer who would otherwise be able to send out dozens of spam per second.

It's not about making spam impossible, but about making it unprofitable enough that the criminals go elsewhere. Economic warfare.


According to google search, captcha solving companies charges 0.3c per captcha[1], which basically translates to half an hour of PoW for digitalocean instance. So if the PoW is less than half hour, spammers would need to pay less with PoW.

[1]: https://2captcha.com/pricing


Then I guess the value comes with the privacy and human-friendliness, then :)


Web filled to the brim with bot content isn't my idea of human friendly.


I'm not sure what comment you're replying to, but I think you got the wrong one. Nothing that I'm proposing results in a "web filled to the brim with bot content".


If an ad can be rendered on a page or if it uses audio it can be blocked. We have it easy right now with how trivial it has been to block ads, but we could face off against rendering and wiping them in real time if we need to.


Not really. Modern DRM uses Intel ME / AMD / ARM equivalent. These execute code the OS doesn’t have privilege to access.


Oh really, that's news to me. I thought one could always read the video frames one at a time.


Nope, it gets access to its own framebuffer that’s composited in the GPU. OS sees a black viewport, and only a black viewport.

The comms is encrypted on the bus using strong cryptography, so you can’t sniff it.

All these software blobs are signed and encrypted, you can’t replace it without the signing key.


Thanks for letting me know! Really interesting stuff.


> As far as I know, current ad blockers can't block ads from Widevine (DRM protected) streams, so I guess it's only a matter of time until Chromium team comes up with Widevine for webpages and then it's game over for normal consumers.

Only where the the adverts are embedded with an encrypted single stream.

Hard to do targeted advertising that way though.

It is a lever that you can pull that's better than nothing though.


Most modern video formats allow you to splice multiple videos together without recompressing, so long as they use the same codec, resolution and framerate and you do it at an I-frame.

So long as you can run code on your CDN edge servers - which Youtube undoubtedly can - there's no technical reason this couldn't be done.


That'd be a good reason to finally break Widevine.


It's only a matter of time before I get an AI-fueled graphics overlay that eliminates anything that looks like an ad from my screen (click to reveal false positives), and then it's game over for advertisers.

Hopefully HDMI/HDCP splitters will add an adblock feature as well.


Until quantum computing becomes mainstream and then consumers can break drm on the fly!


You don't need quantum computing. You just need a debugger. The user already has the encryption key, else they would not be able to see the content.


Widevine has different levels. In level 1 & 2 the key is in a TPM.

Even for level3, i can only inagine that the amount of obfuscation must be pretty intense.


"Post-Quantum" crypto is already being rolled out in expectation of that though.


They already tried with the Web Integrity Environment, but it wasn't very popular.


By the time that happens my hope is that we might have the new GPT-5 with personal agents curating information for us.


I already have a personal (NSA) agent that does this for me.


I'm not sure if I missed a joke about the NSA, or if there's a computer agent you use, in which case i'd love to hear about it.


Hmm... For example which sites?


Don't be evil.


Even without early hints, i assume you could do the same thing with the link http header.

Or if you really dont care about performance, just loading the start (e.g. <head>) of the document and wait a little bit to see which subresources are loaded.


Yep that also works, I've made a proof of concept for that ages ago https://github.com/Mechazawa/pixelAntiAdblock/blob/master/ap...


Yeah but the critical piece here is loading Early Hints happens before the HTML is sent to the browser. So the server can change the HTML of the page based on what the browser does. (I wonder about the performance impact of this though.)

Trying to detect adblock via a <link> (or an <img> or a <script> etc) means you have to do the check in javascript, which can be manipulated by the browser.


No, not neccesarily.

With the link http header (different from the <link> tag) you just send the http headers, but can still change the response body based on what the browser does.

Alternatively, By sending just the start of the document, then pausing, you can change the rest of the document based on what the browser does with the start, since browsers start loading css/js referenced in the document before the main document completes loading. (Before web sockets were a thing, this was basically the technique used for that sort of thing, called "long polling")

None of this requires javascript.


You can send some content (<link>) and then wait for something else to happen (prefetch) before you continue sending the rest of the content (the page).


AdNauseam does just that. It clicks the adds before blocking them (possible to whitelist non-tracking adds). It's a fork of uBlock and what I replaced the uBlock with on my phone and PC.

Sadly, it doesn't do clicking in the private browsing mode, which I usually use not to crowd the browsing history with hn and other forums' articles.


Are you sure you haven't just forgotten to enable the extension in private browsing? Their FAQ suggests that you can enable it for private browsing, but it's not on by default.


I'd be worried I'd get blacklisted by cloudflare etc with maximum prejudice.


I don't understand how this feature even came to be. Presumably these resources are cached (it's going to be used for static resources; for dynamic ones, you'd need to have already performed the request on the server to figure out what to send, so you'd just send the response). So what, you're saving 5 ms off the first page load? Assuming it's not already a static response, in which case again you'd just send it.


Given the web industry's obsession over reducing TTFB as much as possible, I bet no one would use this tricks to avoid tanking their web vitals score.


TTFB role in the overall time to a usable web page has dramatically decreased. Instead of being the primary driver in display of mostly static sites, the role is smaller now due to the increased compilation/execution time of client code.


Meta and Apple are pushing their AR (advertising required) goggles because they are a locked-down systems where it is even more difficult to block ads.


Safari on visionOS supports Content Blockers and extensions just like on every other platform. In what sense is visionOS any different from iOS or macOS in this regard?

EDIT: I suppose the developer of the content blocker needs to already have an iPad version and check the “visionOS” box, but Apple has made this extremely easy and it’s in both Apple and the content blockers’ interest to release a visionOS version.


"Content blockers" are trivial to bypass though. It's a half-assed "solution".


In 9 years of using content blockers I've come across I think one site that eventually prevented ad blocking without resorting to JS: YouTube.

That's it. I've occasionally had to add a custom blocking pattern but essentially nothing else has been impossible to block.

I can't think of many other "half assed solutions" that have worked as advertised for almost a decade.


What do you mean? Safari also supports regular WebExtensions for advanced blocking. I truly don’t know what you’re referring to.


It's even more limited than MV3, let alone MV2




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: