dark-knowledge
dns-adblock
dark-knowledge | dns-adblock | |
---|---|---|
14 | 14 | |
513 | 170 | |
- | - | |
4.6 | 6.8 | |
2 months ago | over 1 year ago | |
JavaScript | Shell | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dark-knowledge
-
Share some articles you've saved
"A curated library of research papers and presentations for counter-detection and web privacy enthusiasts": https://github.com/prescience-data/dark-knowledge
- dark-knowledge: 😈📚 A curated library of research papers and presentations for counter-detection and web privacy enthusiasts - can be applied by this community to fingerprint various threat actors
-
Can browser addons leak user data?
What you said is contrary to the stance of Tor browser devs and not backed up by actual research. Here you can find a good collection of research papers: https://github.com/prescience-data/dark-knowledge
-
Choose your browser carefully| by Unix Sheikh
Browsers are complicated and you won't find a single analysis covering all aspects. For a security analysis Madaidan's blog is a good starting point. For a privacy analysis you need to learn the common tracking methods and which solutions or mitigations are available in which browser (and if they are properly implemented). You could start by learning about the different forms of tracking through state (cookies, cache, storage, ...), which is still one of the most used tracking methods. Of course you also need to check the easy things like telemetry. Then there is fingerprinting which is a huge topic on its own. This is where it's even more fun. You need to start reading research papers, not just one but many and you need to check mitigations used in browsers and their statistical implications (data about this is unfortunately very rare).
-
Will switching to linux make it easier to fingerprint my device?
It's difficult to distinguish without having the knowledge yourself. Maybe Reddit is just not the right place, because most experts don't have the time to argue with non-experts on social media. You can look what experts write in research papers, or in the bug trackers of browsers with fingerprinting mitigations like the Tor browser.
-
Ask HN: Have you ever used anti detect browsers for web scraping?
Plus curated list of research papers here if you want to go deep on the subject matter: https://github.com/prescience-data/dark-knowledge
-
is there a need for addtl FF extensions ?
They become a significant part of your browser fingerprint. If you have a lot extensions installed, this alone could make you uniquely trackable. (See research papers here: https://github.com/prescience-data/dark-knowledge and https://fingerprintjs.com/blog/ad-blocker-fingerprinting/ )
-
VPN with best adblock?
https://github.com/prescience-data/dark-knowledge (search for "extension")
-
Browser Fingerprint
A dedicated list of research papers on browser fingerprinting: https://github.com/prescience-data/dark-knowledge
-
Avoiding Bot Detection
"I'm a noob and using python with selenium to do some basic scraping on StockX" and scraping protected website like stockx with perimeterx is not possible. It's all about reverse engineering, browser introspection, fingerprint (from hardware to software canvas), then you still need tons of ips to rotate and cooldown, finally protection evolve with time and you have to redo most of the things to pass again. A company like Scrapfly exists because it's more expensive to do and maintain such solution internally, look at their public repositories on GitHub low level stuff, network spoofing stacks, packet manipulation, custom angle libs. It takes a long time to learn vs something like `asp=true` from their docs https://scrapfly.io/docs/scrape-api/anti-scraping-protection If you have time and are more interested in this side, you could start to read https://github.com/prescience-data/dark-knowledge and look at https://github.com/berstend/puppeteer-extra/tree/master/packages/puppeteer-extra-plugin-stealth project to see how it works. Do not attempt stealth project helping you to bypass at scale, it's public, anti bot companies are aware and spot it easily - most of the time they don't block directly and use bad fp generated to recognize bots and map proxies ips to collect it and deducted the subnet or residential > My main question is, would it be better to try and make my script act "more human" It's a legend that anti bot use or detect "human" behavior, this signal is not very important, you can randomly move the mouse or things, like is fine, having 0 input events, is suspect but not that much in fact - tactile systems do not trigger any events until you touch so it can't be a strong signal due to false-positive - and doing "behavioral detection" is a big lie in the industry, you can experiment by doing dumb things, it's still passing and at scale ... and when they say "machine learning" it's just basic stats like a throttle do but based on browser fingerprints rather than IP. If you hit some path, like login, registration and payment - they can use some very heavy system with GPU canvas and stuff like but not used for scraping yet > are other methods like switching drivers and using proxies the way to go? Using proxies yes, but with wrong fingerprints (chrome headless, a browser running on server hardware, browser in docker and so on) In fact, there is no magic, mixing driver change nothing, they still manipulate a spotted browser - some are just more flexible than other to spoof correctly some part - like js worker interception to inject scripts and hook correctly but that's all.
dns-adblock
-
Excellent DNS service with a great privacy setup on mobile
Mullvad already has a built-in customizable DNS blocker https://github.com/mullvad/dns-adblock, that way only Mullvad fully sees your traffic, including third-party DNS in the mix just add another entity to get your traffic (even with encrypted DNS, they still see the domain you visit through SNI), and except for systems like AhaDNS Blitz or RethinkDNS, each config is linked to a specific account which means they know your DNS traffic regardless of your IP. Yes, some of them pinky swear they don't log, but why add extra risk?
- DNS Blocker and VPNs
-
Ad and Malware Blocking
Well, simple, the lists are here: https://github.com/mullvad/dns-adblock/tree/main/lists/doh/adblock
-
VPN with best adblock?
Mullvad's VPN also includes their DNS service which has ad and tracker blocking. The blocklists they use are available here.
-
how to use vpn with DDG app tracking protection
Mozilla VPN and Mulvad do that with their custom DNS.
-
DNS over TLS (from Mullvad) while using no upstream or ISP DNS?
Just put FreshTomato on a router and I'm looking for help to continue using Mullvad's ad/tracker/malware blocking DNS when I'm not connected over the VPN. I found some guides using Stubby and DNSMasq, but they did not fit my specific need to use no DNS other than Mullvads. (If it doesn't work it'll act as a kill switch.)
- Mullvad vs Adguard For Blocking Ads And Trackers
-
Anyone use NextDNS with Mullvad?
Yeah I agree about advantages of NextDNS. These are Mullvad's lists, btw. https://github.com/mullvad/dns-adblock/find/main
- Mullvad’s Block ads and Block trackers vs. Pi-hole network wide ab-blocking?
- using ios 9
What are some alternatives?
puppeteer-extra - 💯 Teach puppeteer new tricks through plugins.
mozilla-vpn-client - A fast, secure and easy to use VPN. Built by the makers of Firefox.
nuTensor - nuTensor: Point and click matrix to filter net requests according to source, destination and type
FiltersRegistry - Known filters subscriptions transformed for better compatibility with AdGuard
privacytests.org - Source code for privacytests.org. Includes browser testing code and site rendering.
AdGuardHome - Network-wide ads & trackers blocking DNS server
Windows11_Hardening - a collection about Windows 11
Pi-hole - A black hole for Internet advertisements
uBlock - uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.
storage-partitioning - Client-Side Storage Partitioning
hero - The web browser built for scraping
user.js - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening