It garbles advertisers’ data as a result, but you must disable uBlock Origin to run it; they can’t work simultaneously. I recently moved to it and, so far, am never looking back!

138 points

Couple of issues I’m wondering about…

First, wouldn’t clicking on everything just make you easier to track?

Second, how much bandwidth would all this use?

permalink
report
reply
19 points

Also wouldn’t this be directing a ton of money to google? (or I guess any other ad provider)

permalink
report
parent
reply
42 points

No, because it devalues their click through, as no sales will result from those clicks.

It’s kinda like printing money, there’s more of it, but the overall value hasn’t increased.

permalink
report
parent
reply
58 points

The advertisers are paying for the opportunity either way. Clicks cost them more money than just displaying the ad. Useless clicks cost them money for nothing.

permalink
report
parent
reply
2 points

The advertisers could be paying based on interactions and/or their rates could be negotiated around interaction, so unless a sizeable number of people use this it would be giving money to Goog

permalink
report
parent
reply
8 points
*

In the short term, I would think so.

In the long run, it makes it less appealing for companies to advertise, because they would have larger costs while having less sales. That, in return, hurts Google as advertisers don’t want to pay as much anymore. If 80% of all users used this extension, advertisers would have to pay more than ever, while having only 20% of all users can be reached (simplified, of course).

Or in short, it’s designed to hurt the system as a whole, not specific companies.

permalink
report
parent
reply

Yeah, I can’t find an answer whether the “click” is behind some obfuscation, or if the “click every ad” is the obfuscation step itself by attempting to poison the data. The latter may work but yes, may actually increase tracking. Wish that answer wasn’t so hard to find on their site.

permalink
report
parent
reply
10 points

Thanks, I didn’t see this, there was a different embedded FAQ that didn’t have the specific Q & A below.

But, if anything, it seems to confirm the ad itself is just legitimately clicked from the user’s IP address and hidden from the user, and that there is code execution protection, but not that there is any privacy protection? It’s still very ambiguous.

How does AdNauseam “click Ads”?

AdNauseam ‘clicks’ Ads by issuing an HTTP request to the URL to which they lead. In current versions the is done via an XMLHttpRequest (or AJAX request) issued in a background process. This lightweight request signals a ‘click’ on the server responsible for the Ad, but does so without opening any additional windows or pages on your computer. Further it allows AdNauseam to safely receive and discard the resulting response data, rather than executing it in the browser, thus preventing a range of potential security problems (ransomware, rogue Javascript or Flash code, XSS-attacks, etc.) caused by malfunctioning or malicious Ads. Although it is completely safe, AdNauseam’s clicking behaviour can be de-activated in the settings panel.

permalink
report
parent
reply
172 points
*
  1. not in this way
  2. not enough to matter

the way it works is sending an HTTP request that registers as a “click” to the advertiser (thus costing them money), but then doesn’t actually let the browser download any content and fetch the webpage, basically pi-holes the destination site and any attached tracking cookies. Combined with the fact that it does this to every ad, it would basically poison any click tracking.

edit: pedants

and before I get any more of you, this is just what I remember reading about adnauseam, do not take it as gospel, go look at AdNauseam’s FAQ.

permalink
report
parent
reply
-40 points
*

none

Ah great

it works [by] sending an HTTP request that registers as a “click” to the advertiser

Uh, wait a minute. 🤔

Sending a request also uses bandwidth, you know.

permalink
report
parent
reply
20 points

That HTTP request would also show up in the advertisers web logs with your origin IP address.

permalink
report
parent
reply
76 points
*

Okay, fine, not enough to matter. Are you satisfied with that?

permalink
report
parent
reply
141 points

A basic GET request, even with a long querystring, will be negligible even on a 1998 dial-up connection.

permalink
report
parent
reply
7 points
*
Deleted by creator
permalink
report
parent
reply
7 points

This would just give money to the advertisers.

permalink
report
reply
109 points

This transfers money from the advertiser to the advertising agency, without creating a sale for the advertiser. This devalues the services of the agency.

permalink
report
parent
reply
4 points

I still don’t want to give those fuckers money. If I just use uBlock, the ad is never seen, thus no sale is made and the slimy ad company gets money.

permalink
report
parent
reply
7 points

Totally, it’s up to you. The idea for fake-clickers is the long game: the marketers think they’re landing clicks over months or possibly even years, but will may slowly realize (gotta account for the stubborn ones) that it’s ineffective and eventually pivot to different approaches, hopefully ones that involve less tracking (I can’t imagine what any worse approach could be, at least).

permalink
report
parent
reply
19 points

Interesting, was wondering about this. This would also “help” the websites with more ad income right?

permalink
report
reply
20 points
*

if thats true, brb setting up a website and a bot farm

permalink
report
parent
reply
7 points

Haha I imagine they need at least unique ip addresses to count. Now I wonder if for clicks to count you need to properly click through and load the target website with the same “browser fingerprint”.

permalink
report
parent
reply
6 points
*

Careful: that then enters the world of ad fraud, which randos like us doing the clicking isn’t considered as.

permalink
report
parent
reply
1 point

Potentially.

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
-46 points

IMO, this is a bit much.

It’s one thing to block ads, it’s another thing to essentially participate in an ad fraud scheme. If this simply hurt Google, I would have no issues (they are corrupt criminals, an American oligarchic institution), but you also risking harming independent sites that have done nothing wrong.

permalink
report
reply
62 points

Why is advertising ok, but any response in opposition of it, is not?

permalink
report
parent
reply
-25 points

This is an excessive approach that risks collateral damage to 3rd parties who are not involved.

I have no issues with blocking ads (internet is unusable without ublock origin + Pihole), but actually simulating clicks is IMO not the right approach.

permalink
report
parent
reply
16 points

I still don’t get why you think it’s not the right approach. Seems perfectly fine to me.

permalink
report
parent
reply
9 points

Collateral damage to advertisers? Sounds like a feature, not a bug.

permalink
report
parent
reply
-11 points

To each their own. I’m in your boat too, I think.

permalink
report
parent
reply
19 points

Remember, advertising is jist a new word they made to wash over the ick with its original name, propaganda. I’d rather not participate in any propaganda.

permalink
report
parent
reply
9 points

You incorrectly use the term ad fraud, which addresses advertisers themselves automating clicks on their own links to generate fake income. There is nothing wrong with people-with-no-corporate-interest who click.

permalink
report
parent
reply
-3 points

Some ads have used browser exploits to infect visitors in the past. So this is a very, very bad idea, if it actually is implemented in a way that is hard to filter for ad networks.

permalink
report
reply
39 points

So the way I understand this to work, it’s 100% safe from the type of attack you’re describing.

You are clicking the link (asking the advertiser for the data) but then never actually fetching it.

So you can never get the malicious payload to be infected.

permalink
report
parent
reply
-8 points

Im too scared to trust it works out fine in the end to use it, been raised on the idea that interacting with an ad in any way other than task managering the pop up is dangerous. Wheres the part of the code that makes it safe and a write up of how it functions, otherwise im fine just blocking ads with regular ublock.

permalink
report
parent
reply
4 points

What makes you think uBlock is safe without checking relevant code sections?

permalink
report
parent
reply
17 points

the part that’s safe is in the browser. it’s a basic fact of how http requests work that you can just request data and then not read it.

also, “task managering the popups”? unless i’ve missed some very weird development that has literally never worked, because popup windows are part of the parent process.

permalink
report
parent
reply
4 points
*

Here you go, from the repo:

  const visitAd = function (ad) {
    function timeoutError(xhr) {
      return onVisitError.call(xhr, {
        type: 'timeout'
      });
    }

    const url = ad && ad.targetUrl, now = markActivity();

    // tell menu/vault we have a new attempt
    broadcast({
      what: 'adAttempt',
      ad: ad
    });

    if (xhr) {

      if (xhr.delegate.attemptedTs) {

        const elapsed = (now - xhr.delegate.attemptedTs);

        // TODO: why does this happen... a redirect?
        warn('[TRYING] Attempt to reuse xhr from ' + elapsed + " ms ago");

        if (elapsed > visitTimeout)
          timeoutError();
      }
      else {

        warn('[TRYING] Attempt to reuse xhr with no attemptedTs!!', xhr);
      }
    }

    ad.attempts++;
    ad.attemptedTs = now;

    if (!validateTarget(ad)) return deleteAd(ad);

    return sendXhr(ad);
    // return openAdInNewTab(ad);
    // return popUnderAd(ad)
  };

  const sendXhr = function (ad) {

    // if we've parsed an obfuscated target, use it
    const target = ad.parsedTargetUrl || ad.targetUrl;

    log('[TRYING] ' + adinfo(ad), ad.targetUrl);

    xhr = new XMLHttpRequest();

    try {
      xhr.open('get', target, true);
      xhr.withCredentials = true;
      xhr.delegate = ad;
      xhr.timeout = visitTimeout;
      xhr.onload = onVisitResponse;
      xhr.onerror = onVisitError;
      xhr.ontimeout = onVisitError;
      xhr.responseType = ''; // 'document'?;
      xhr.send();
    } catch (e) {
      onVisitError.call(xhr, e);
    }
  }

  const onVisitResponse = function () {

    this.onload = this.onerror = this.ontimeout = null;

    markActivity();

    const ad = this.delegate;

    if (!ad) {

      return err('Request received without Ad: ' + this.responseURL);
    }

    if (!ad.id) {

      return warn("Visit response from deleted ad! ", ad);
    }

    ad.attemptedTs = 0; // reset as visit no longer in progress

    const status = this.status || 200, html = this.responseText;

    if (failAllVisits || status < 200 || status >= 300) {
      return onVisitError.call(this, {
        status: status,
        responseText: html
      });
    }

    try {

      if (!isFacebookExternal(this, ad)) {

        updateAdOnSuccess(this, ad, parseTitle(this));
      }

    } catch (e) {

      warn(e.message);
    }

    xhr = null; // end the visit
  };

That’s pretty much it! Let me know if it doesn’t make sense, I can annotate it

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


Community stats

  • 20K

    Monthly active users

  • 15K

    Posts

  • 642K

    Comments