this post was submitted on 20 Mar 2025
381 points (99.7% liked)

Open Source

34914 readers
508 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] jagged_circle@feddit.nl 3 points 2 days ago* (last edited 2 days ago) (1 children)

Sad there's no mention of running an Onion Service. That has built-in PoW for DoS protection. So you dont have to be an asshole and block all if Brazil or China or Edge users.

Just use Tor, silly sysadmins

[–] Max_P@lemmy.max-p.me 12 points 2 days ago (2 children)

Proof of work is what those modern captchas tend to do I believe. Not useful to stop creating accounts and such, but very effective to stop crawlers.

Have the same problem at work, and Cloudflare does jack shit about it. Half that traffic uses user agents that have no chance to even support TLS1.3, I see some IE5, IE6, Opera with their old Presto engine, I've even seen Netscape. Complete and utter bullshit. At this point if you're not on an allow list of known common user agents or logged in, you get a PoW captcha.

[–] lightnegative@lemmy.world 1 points 1 day ago

If I was a bot author intent on causing misery I'd just use the user agent from the latest version of Firefox/Chrome/Edge that legitimate users would use.

It's just a string controlled by the client at the end of the day and I'm surprised the GPT and OpenAI bots announce themselves in it. Associating meaning on the server side is always going to be problematic if the client can control the value

[–] jagged_circle@feddit.nl 2 points 2 days ago

Yeah but Tor's doesn't require JavaScript, so you dont have to block at-risk users and opress them further