Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Proof-of-work schemes such as Hashcash[1] and simple ratelimiting algorithms can act as deterrents to spamming and scraping attacks.

There are other kinds of non-invasive bot management you can do as well, however, due to various reasons I'm not in a position to talk about it. A few other methods are mentioned at the end of the post being discussed[2].

[1] https://en.wikipedia.org/wiki/Hashcash

[2] https://antoinevastel.com/bot%20detection/2023/02/19/new-hea...



Proof of work isn't very practical here, because computation is a lot cheaper in datacenters than on phones.


The trick is to prevent the offloading of the proof-of-work challenge to another device, as suggested in the Picasso paper[1].

[1] https://storage.googleapis.com/pub-tools-public-publication-...


Can privacy be preserved with zero knowledge proofs? I don't like the idea of universal fingerprinted devices in an already heavily authoritarian world.


Neat! This does seem like it should work!

Semantic quibble: it's less "proof of work" and more "proof of hardware+work". Or, as they call it, hardware-bound proof of work. The reason you can't offload the challenge to a more powerful device is that they rely on identifying stable differences for each device class that ultimately trace down to the hardware they're running on.


From reading the abstract, isn't this just exploiting the same class of security vulnerabilities that the OP is lamenting are being fixed?


Not sure. Maybe not, if it's about device-specific information instead of headed-vs-headless distinctions?


Wasn't mining in the browser basically shutdown by every major browser?

It was done super fast.. one can't help but think that Google pull all the levers they had at Apple/Mozilla to made sure the first viable alternative to advertisement was killed before it was born. But I think as a side effect it make PoW might be sort of impossible?

I don't really know how to mining "fingerprinting" works exactly - so would be curious to know if I'm wrong


What killed "mining in the browser", more than anything else, was:

1) It was almost exclusively used for malicious purposes. Very few legitimate web sites used cryptominers, and it was never considered a viable substitute for display advertising; it was primarily deployed on hacked web sites. Browser vendors were relatively slow to react; many of the first movers were actually antivirus/antimalware vendors adding blocks on cryptominer scripts and domains.

2) The most popular cryptominer scripts, like Coinhive, all mined the Monero coin. (Most other cryptocurrencies were impractical to mine without hardware acceleration.) Monero prices were at an all-time high at the time; when Monero prices crashed in late 2018, the revenue from running cryptominer scripts dropped dramatically, making these scripts much less profitable to run. (This is ultimately what led Coinhive to shut down.)


I guess slow/fast is subjective. It didn't seem like enough time passed for a legitimate ecosystem to develop. Just the basic idea of say hosting a static-site/blog on a VPS with a cryptominer that could pay for itself would have been a game changer - but was probably just the tip of the iceberg of possibilities. Instead we're still stuck either having to sell our traffic/info to Google/Microsoft, put up ads, pay for it out of pocket. The entrenched players won

The hacked site boogieman felt overblown (and from what you're saying it sounds like if would have died out anyway). I'm sure it happened, but at least personally I never once came across it. Or if I did, then my CPU spun a bit more and I didn't notice. No real harm done.

More fundamentally we're now in territory where the browser vendors get to decide what javascript is okay to run and which isn't.

Anyway, it's just complaining into the ether :) it is what it is. thanks for the context of the market forces and antivirus companies


> I guess slow/fast is subjective. It didn't seem like enough time passed for a legitimate ecosystem to develop.

Coinhive was live from 2017 - 2019, and it basically ran the whole course from exciting new tech to widely abused to dead over those two years. I don't think it needed more time.

> The hacked site boogieman felt overblown...

Troy Hunt acquired several of the Coinhive domains in 2021 -- two years after the service shut down -- and it was still getting hundreds of thousands of requests a day, mostly from compromised web sites and/or infected routers. It was a serious problem, albeit one which mostly affected smaller and poorly maintained web sites.

https://www.troyhunt.com/i-now-own-the-coinhive-domain-heres...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: