• EndlessNightmare@reddthat.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 hours ago

      I’m just going to say it: YouTube really started going to shit when professional, monetized YouTubers started becoming a big thing.

      • sraars@iamaghast.com
        link
        fedilink
        arrow-up
        1
        ·
        60 minutes ago

        I’d like to see folks do more PeerTube instances in the future or something similar grow but there is cost involved that people don’t have with YouTube.

  • cley_faye@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    3
    ·
    11 hours ago

    People don’t realize how much shit youtube/google ignores over time, for whatever reasons (but mostly because it’s cheaper to ignoer I’d guess). With most major consumer VPN providers, this is very easy to detect. Adblockers are easy to detect. Tampering with the website structure? Believe it or not, quite easy to detect when someone hide a component or change a title or a button.

    If they decided to seriously get after people that circumvent geofencing, people that block ads, people that change the interface to their liking, or people that plainly use alternative websites, they could easily. And it would require far less effort on their end to keep things complicated than it would require on our end to keep things working at an acceptable level.

    • survirtual@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      11 hours ago

      Only kind of true.

      If they did implement all those measures, all you do is launch a puppet browser rendered off screen and scrape the content you want. This could work for any site and it is impossible for anyone to detect.

      For ads, as a nuclear option, you can detect when they occur and black the stream out.

      I would personally do this if left with no other option.

      • cley_faye@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        11 hours ago

        Cue detection of “realistic” human activity on the UI and preventing streaming if the server determine this activity does not match a human enough pattern.

        I’m exaggerating on that one, but… that’s not even that implausible these days.

        My point was, dancing this dance with “big website”, whoever it is, will always be an endless uphill battle.

        • survirtual@lemmy.world
          link
          fedilink
          English
          arrow-up
          16
          ·
          11 hours ago

          They can’t do that because of accessibility reasons. If they did that, a disabled person has grounds to sue them for proper aria hints & controls.

          It doesn’t matter what kind of content it is, either. It must be made accessible.

          • cley_faye@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            6 hours ago

            Uh. I don’t know how it is on the other side of the ocean, but around here, it’s a nice goal, but there’s much more care going into making messes than implementing accessible websites. Even official government services sometimes just barely slaps an “accessibility conformity: partial/none” and keep going on.

            I’m not sure having an accessible web is enough to overcome the thirst for ad money and control.

    • AnarchistArtificer@slrpnk.net
      link
      fedilink
      English
      arrow-up
      7
      ·
      9 hours ago

      Sometimes I do get YouTube telling me that I need to disable my adblocker to access a video, so they do try to block that stuff (though I suspect that the infrequency with which this happens combined with the fact that not everyone does experience it when some people do report this happening suggests that they’re just testing methods of detection and blocking)

      Usually when it happens, I just go into my Ublock settings and update stuff. I can’t remember that ever not working. It feels like a low-key arms race, in a cold-war kind of way

  • chillpanzee@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    13 hours ago

    They’ve been able to detect commercial VPNs for a long time. They’re just starting to care enough to take some action now.

    • shalafi@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      9 hours ago

      I rolled my own VPN, no issues. Won’t say how because I got my ass beat for recommending it last time.

  • lostoncalantha@lemmy.world
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    1
    ·
    14 hours ago

    As someone who uses multiple VPNs daily I have a suggestion. Try to locate a different server and connect to it. See if there’s a drop down menu in your VPN app. Sometimes a particular IP on one of those servers flags websites’ fraud detection. Sometimes I can switch servers on my VPN and refresh the page and it loads just fine.

    • porksnort@slrpnk.net
      link
      fedilink
      English
      arrow-up
      19
      ·
      13 hours ago

      Excellent advice. It’s a game of cat and mouse (or whack-a-mole, whatever metaphor works…).

      Sites that want your data for whatever reason hate VPNs, so they identify exit points and blacklist traffic from them. VPN providers know this so they spin up new exit points with different IP.

      Just try a different server. Sometimes it’s a regional ’rights’ issue, so pick another server that is in the same jurisdiction, for instance in the case of streaming.

      • Axolotl_cpp@feddit.it
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        I think you can change some config thing to have the exit node be in a certain country so it may help? (Thought i am not sure if there is, the last time i configurated anything was for using HTTP), also, i have had a good expirience with the speed on TOR, i am in europe, where are you?

  • Xylight@lemdro.id
    link
    fedilink
    English
    arrow-up
    54
    ·
    10 hours ago

    I encounter VPN blocks everywhere frequently. I usually just reroll my selected server until the block goes away

  • Bennyboybumberchums@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    ·
    6 hours ago

    They always could. What appears to be happening is that channels now have the option to turn on “a switch” so that content wont play if a VPN is detected. Most VPN ip addresses are well known, because they arent a secret. Everyone who uses the VPN goes through it.

    If you come across the above message, its because the content creator turned it on. I had it come up with “stick to football”. Its the only thing that it comes up with. I just unsubbed and wont watch anymore. Im not turning off my VPN for anyone or anything. Id rather just go with out. I encourage all of you to do the same.

    • GenosseFlosse@feddit.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 hours ago

      You could probably just record the users ID and it’s IP address. IP addresses that see a lot of different user IDs are either VPNs, companies or universities.

      • finitebanjo@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        Another thing that only very large companies can do is see the response time and compare packet size from different servers to narrow down your location, effectively defeating the VPN in a lot of cases.

        Hypothetically, a specific amount of bytes gets sent to server B, response time indicates it was received 300 miles away which matches the response time of going from Server B to Server A where the user lives.

        Of course it’s still important to use a VPN, if only because those big companies don’t want us to.

        • Seefoo@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          This…sounds a bit like bs. Can you share a more detailed writeup? At best you could get a radius, but that wouldn’t really be helpful

          • rami@ani.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            47 minutes ago

            I imagine they could compile large datasets of ping times and server locations and do some extrapolation. I don’t think it ever goes past a best guess but they’d have an idea (if what this person said actually happens).

            • lazylion_ca@lemmy.ca
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              14 minutes ago

              Companies dont really need to know where you are. They just need to know where you aren’t. If you are not within a certain threshold of response time to certain cdn servers, then its reasonable to assume that you are outside their contractually obligated broadcast region.

        • i_am_not_a_robot@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          1
          ·
          15 minutes ago

          The latency to your VPN server is a constant added to the latency between your VPN server and whatever servers you are connected to. As long as the user’s VPN service doesn’t use different VPN servers for different destinations, it is impossible to determine the location of the user behind the VPN based on latency, and in general it is impossible to determine how far a user is from their VPN server because of varying latency introduced by the user’s own network or by bad infrastructure at the local ISP level. You can only know how far they aren’t based on the speed of light across the surface of the earth.

          But, without a VPN, this is a real attack that was proven by a high school student using some quirks of Discord CDNs. Even without using Discord’s CDNs, if somebody wanted to locate web visitors using this technique, they could just rent CDN resources like nearly every big company is doing. Of course, if you have the opportunity to pull this off, you normally have the user’s IP address and don’t care about inferring the location by latency. The reason why it was notable with Discord was because the attacker was not able to obtain the victim’s IP address.