Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How will bots using plugins and headless mode be managed with this? #23

Open
Kuldran opened this issue Oct 24, 2023 · 2 comments
Open

Comments

@Kuldran
Copy link

Kuldran commented Oct 24, 2023

Chrome has been used to mimic legitimate user traffic with the uses of plugins will this type of traffic be opted out when using automation tools and/or plugins to limit abuse on the proxy network? Or would a header be sent to inform the destination this particular request should be handled with care?

@DavidSchinazi
Copy link
Collaborator

This feature will require users to be logged in, and we will use blinded tokens to only allow access to such users (without making user identifiers visible to the proxy).

@Kuldran
Copy link
Author

Kuldran commented Oct 27, 2023

With due respect @DavidSchinazi, I don't think this project has been well thought out regarding abuse potential. I would expect a more concrete answer, Google Staff is expecting us to get on board with this I agree that privacy is something we all strive for. That said an answer to a serious question to the tune of "don't worry about it" or "we will fake it till we make it" is not something I expected some a dev of especially your experience.

The issue at hand revolves around people who have a skill set which allows them to make an income manipulating a browser in such a fashion distinguishing their action from a typical user and non-user is near impossible. Adding credential requirements means little to nothing to them. In most cases, it's 1 to 3 extra methods maybe. This is assuming that we are not talking about vectors where a malicious plugin abuses a person's browser, and/or steals tokens.

The threat of session stealing/ hijacking also becomes an issue saying "we expire tokens" does not change the fact bad actors can still have a window of abuse. Depending on the attack vector Chrome / Google's only recourse would be to term accounts.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants