Show newer

this is a questionnare for mods and admins that use and are familiar with authorized fetch

its not a quiz, its not mandatory to participate in, and if you dont know what authorized fetch is, that's cool, too

if you dont know what it is, please feel free to not fill the form out instead of leaving a reply that doesn't help.

Show thread

I am writing some research on safety tools and history in the fediverse. I have asked my mutuals and friends about authorized fetch, but am curious about what other #mods or #admins think about authorized fetch

I created a short questionnaire if you could be so kind as to share and answer!

forms.gle/fFs2rELm8UdZG2ZS8

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@stapper are your access logs not gzipped after the first few? might need zgrep

re: instance block rec 

@gubi just look at the admin's interactions. literally only interacts with instances already widely suspended across fedi fediverse.bbad.com/reg

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@handlerug oh yep, seeing that too but only from december/january

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

If so, you can send an abuse report to abuse@aussiebroadband.com.au, regarding ips `159.196.229.70` and `2a01:4f8:162:6027::2`. One of my servers shows scraping access logs going back to at least December 2022

Show thread

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

also `2a01:4f8:162:6027::2`, with user-agents "Ruby, mastodon 0.1.1" or "mastodon_stream v0.1"

Show thread

:boosts_ok_gay:​ toot/blocklist scraping info request 

can other server admins grep their logs for `159.196.229.70`, they seem to be doing mass scraping of public timelines, toots and blocklists.
from an Australian residential ip?

Show thread

instance block rec 

bbad.com (instance at fediverse.bbad.com)

federates/interacts with all the usual scum

Show thread

people on the train are too loud to listen my podcast, even with anc :>

Show thread

soft breakcore to blast your ears with my beloved

"you should federate with meta because activitypub is all about openness" is just "why doesn't the so-called tolerant left tolerate my bigotry" for computers

submarine 

THE GROVERSUB
fucking lmao

@goaty @futurebird it's called sponsor.ajay.app/, really works incredibly well. People crowdsource the timestamps for ad-reads and such, and the extension can automatically skip forward. A lot of the time you don't even notice, it's just a cut to the next part of the video

re: Blocklist scraping by fash 

@pastelpunkbandit lmao please unblock us santa uwu we were just shitposting

re: Mitigating blocklist scraping by fash 

Quite interesting workaround; the kiwifarms scraper is configured to not follow HTTP redirects, so by adding one you can make them give up, while legit users can still view the page without issues.

git.pixie.town/f0x/nixos/src/b
Adapts my nginx setup to redirect /about/more to /about/much-more

Of course a scraper could go to much-more directly now, but if we all pick something unique, that's impossible to hardcode for. And if they *do* start following redirects, we could introduce honeypot instances that redirect all around the place, disrupting the scrape (which all happens in sequence across domains btw)

Show thread

re: Blocklist scraping by fash 

@kescher tarpit would be of limited use I think, since all their requests have a 5 second timeout

re: Blocklist scraping by fash 

`70.106.192.146` too, though it's unclear what software it's running

Show thread

Blocklist scraping by fash 

So this has been an ongoing issue, would love it if people found the earlier threads about it for more context cause I don't have the spoons right now

Originally written by "mint", hosted on the kiwifarms git is a tool that continuously scrapes publicized instance blocklists to allow searching who has you blocked (resulting in emails like uwu we did nothing wrong how dare you block our instance)

Through correlation, turns out the main IP being used by fba.ryona.agency is `54.37.233.246`. Blocking that at the firewall level prevents them from getting any new data.

Other instances exist too though, being hosted on
`23.24.204.110`, `45.86.70.49`, `88.65.6.124`, `187.190.192.31`

the drow.be / bka.li / teleyal.blog / mooneyed.de "kromonos" user has their own version, that feeds an API that gives your instance a highscore for blocking their shit, scrapes from `185.244.192.119`, with user agents presenting as random instances

These, and other scrapish ip's are also listed in git.pixie.town/f0x/nixos/src/b

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.