Andy Reid to [email protected]English • 2 years agoAI companies are violating a basic social contract of the web and and ignoring robots.txtwww.theverge.comexternal-linkmessage-square196fedilinkarrow-up1989cross-posted to: [email protected][email protected][email protected][email protected]
arrow-up1989external-linkAI companies are violating a basic social contract of the web and and ignoring robots.txtwww.theverge.comAndy Reid to [email protected]English • 2 years agomessage-square196fedilinkcross-posted to: [email protected][email protected][email protected][email protected]
minus-square@[email protected]linkfedilinkEnglish45•2 years agoIf it doesn’t get queried that’s the fault of the webscraper. You don’t need JS built into the robots.txt file either. Just add some line like: here-there-be-dragons.html Any client that hits that page (and maybe doesn’t pass a captcha check) gets banned. Or even better, they get a long stream of nonsense.
minus-square@[email protected]linkfedilinkEnglish20•2 years agoserver { name herebedragons.example.com; root /dev/random; }
minus-squareAniki 🌱🌿linkfedilinkEnglish3•edit-22 years agoI wonder if Nginx would just load random into memory until the kernel OOM kills it.
minus-square@[email protected]linkfedilinkEnglish12•2 years agoNice idea! Better use /dev/urandom through, as that is non blocking. See here.
minus-squareAniki 🌱🌿linkfedilinkEnglish1•2 years agoThat was really interesting. I always used urandom by practice and wondered what the difference was.
minus-square@[email protected]linkfedilinkEnglish10•2 years agoI actually love the data-poisoning approach. I think that sort of strategy is going to be an unfortunately necessary part of the future of the web.
If it doesn’t get queried that’s the fault of the webscraper. You don’t need JS built into the robots.txt file either. Just add some line like:
Any client that hits that page (and maybe doesn’t pass a captcha check) gets banned. Or even better, they get a long stream of nonsense.
server {
name herebedragons.example.com; root /dev/random;
}
I wonder if Nginx would just load random into memory until the kernel OOM kills it.
Nice idea! Better use
/dev/urandom
through, as that is non blocking. See here.That was really interesting. I always used urandom by practice and wondered what the difference was.
I actually love the data-poisoning approach. I think that sort of strategy is going to be an unfortunately necessary part of the future of the web.