Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How would they make it harder / reduce bots without sacrificing privacy (such as SMS/ID verification/etc.)?

I think if you can realistically solve that you'd be a millionaire already.



I don’t think you realistically can. I’d instead approach it from limiting the reach of new accounts until proven as good actors.

Or switch it back to invite only, as there’s a massive userbase now, and if you invite a problematic account it becomes a problem for your account too. Operate on a vouch system.


> good actors

Aha... dont be naïve... what is the definition of "good" in 2024? Take the US population for example... 50% will say your intentions are "good", the other half will not!


This still better than existing system.


So maybe think with your own head instead of just taking the average of everyone else's opinion.


this IMO is why groupchat is best social network. Anything with more than 20 people doesnt go on my phone. sorry marketers.


What are you doing here then?


this place has a tight enough focus to be decent. generalist platforms are doomed from the cradle.


Moderation lists and labellers honestly already get you most of the way there. Labellers are very effective at flagging spam/botted content and accounts that continuously show up on labellers as spam/bot content get referred to moderation lists dedicated to specific types of spam and bot content.

So you can already start by using a labeller and just hiding that content behind a warning (kind of like the NSFW wall), hiding it entirely, or just attaching a visual tag to it (based on preferences). And then to filter out more consistent perpetrators you can rely on mute/block lists.


No one's saying the quiet part out loud. Pay for an account. Even $1, one time, is enough to cut almost all those bot farms down.

Is it realistic? yes. Is it viable? I'm not sure. People claim to care more about privacy but will choose ads and trackers over a subscription any day of the week. Anyone operating a website or app with a subsciption knows this.


Considering that some bot operators [1] and spammers [2] on Twitter are willing to pay the $8 a month for fake verification, I don't expect a $1 sign-up fee to be very effective.

[1] https://techcrunch.com/2024/01/10/it-sure-looks-like-x-twitt...

[2] https://techcrunch.com/2023/07/13/twitter-admits-to-having-a...


That problem is unsolvable


What about using TPM modules? I've been researching these modules lately, primarily for use in online video games. From my understanding, you can use TPMs to effectively ban players (TPM ban) based on their hardware. This would mean every time an account is banned, the bad actor would have to switch to a different TPM. Since a TPM costs real money, this places a limit on the scalability of a bad actor.


Cool, if you can require them for every possible interaction on a platform but even that violates privacy if you have one universal value that ties it all together (the identifier of the specific TPM).

It's just the phone number/email issue but tied to hardware. If you think these things won't leak and allow bad actors to tie your accounts across services then I have some lovely real estate in Florida you may be interested in.

It also appears that resetting a fTPM works around this since it fully resets the TPM. Even if it didn't then people buying used CPUs could find that they're banned from games that they've never even played or installed on their system before


> It also appears that resetting a fTPM works around this since it fully resets the TPM. Even if it didn't then people buying used CPUs could find that they're banned from games that they've never even played or installed on their system before

It depends how the TPM utilization was applied in practice. The initial manufacturer key (Endorsement Key) is hardcoded and unextractable. All the long-lived keys are derived from it, and can be verified by using the public part of the EK. Usually EK (or cert created from it) is directly used for remote attestation.

More here, for example : https://learn.microsoft.com/en-us/windows-server/identity/ad...


> What about using TPM modules? I've been researching these modules lately, primarily for use in online video games. From my understanding, you can use TPMs to effectively ban players (TPM ban) based on their hardware. This would mean every time an account is banned, the bad actor would have to switch to a different TPM. Since a TPM costs real money, this places a limit on the scalability of a bad actor.

It is even worse for privacy than phone number. You can never change it and you can be linked between different services, soon automatically if Google goes forward with the plans.


TPM can be emulated in software, QEMU already supports this for running Windows 11.


I disagree, I think we’re pretty close to having LLMs removing anything that doesn’t fit the “tone” of the board.


Do you know of any platforms currently using LLMs to do this?


> I think if you can realistically solve that you'd be a millionaire already.

Please.

If I knew how to do that, or even how to reduce bots even with SMS verification etc., I'd be a multi-billionaire at least.

Making a twitter clone is relatively easy, making a community with a good vibe that's actually worth spending time using is the one single problem that makes none of the clones stand out to normal users.


One idea I had (feel free to steal this idea for your own use) was a one-time crypto payment to create an account. Of course you can't prevent bots from doing that, but if the price is right then I think it might greatly limit the number of bots on the platform as well as possibly limit the number of low-quality accounts.

But you don't know what you don't know, so I might be missing something that makes this pointless.


Bad actors were willing to pay for whatever Twitter's premium thingie was called at the time, shortly after Musk started changing what the blue tick meant.


Metafilter used to charge a one-time fee of $5:

https://news.ycombinator.com/item?id=467870


hashcash


How does proof of work prevent bots or spam? Most of these bots run full-blown browsers now.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: