home.social

#impersonate — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #impersonate, aggregated by home.social.

  1. Why #ICE Is Allowed to #Impersonate #LawEnforcement

    “There's no accountability,” one expert tells WIRED of ICE’s ability to #lie to the public. "The consequence of this is that it’s going to be a systemic harm across all law enforcement.”
    #trust #Trump #immigration #dhs #cbp

    wired.com/story/why-ice-is-all

  2. → Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
    blog.cloudflare.com/perplexity

    “We observed that #Perplexity [an AI-powered answer engine] uses not only their declared #user_agent, but also a generic browser intended to #impersonate Google Chrome on macOS when their declared crawler was blocked.”

    “This activity was observed across tens of thousands of domains and millions of requests per day.”

    #AI #evade #stealth #website #browser #crawler #blocked

  3. → Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
    blog.cloudflare.com/perplexity

    “We observed that #Perplexity [an AI-powered answer engine] uses not only their declared #user_agent, but also a generic browser intended to #impersonate Google Chrome on macOS when their declared crawler was blocked.”

    “This activity was observed across tens of thousands of domains and millions of requests per day.”

    #AI #evade #stealth #website #browser #crawler #blocked

  4. → Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
    blog.cloudflare.com/perplexity

    “We observed that #Perplexity [an AI-powered answer engine] uses not only their declared #user_agent, but also a generic browser intended to #impersonate Google Chrome on macOS when their declared crawler was blocked.”

    “This activity was observed across tens of thousands of domains and millions of requests per day.”

    #AI #evade #stealth #website #browser #crawler #blocked

  5. → Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
    blog.cloudflare.com/perplexity

    “We observed that #Perplexity [an AI-powered answer engine] uses not only their declared #user_agent, but also a generic browser intended to #impersonate Google Chrome on macOS when their declared crawler was blocked.”

    “This activity was observed across tens of thousands of domains and millions of requests per day.”

    #AI #evade #stealth #website #browser #crawler #blocked

  6. → Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
    blog.cloudflare.com/perplexity

    “We observed that #Perplexity [an AI-powered answer engine] uses not only their declared #user_agent, but also a generic browser intended to #impersonate Google Chrome on macOS when their declared crawler was blocked.”

    “This activity was observed across tens of thousands of domains and millions of requests per day.”

    #AI #evade #stealth #website #browser #crawler #blocked

  7. Tuesday, July 29, 2025

    “Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more

    activitypub.writeworks.uk/2025

  8. Tuesday, July 29, 2025

    “Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more

    activitypub.writeworks.uk/2025

  9. Tuesday, July 29, 2025

    “Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more

    activitypub.writeworks.uk/2025

  10. Tuesday, July 29, 2025

    “Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more

    activitypub.writeworks.uk/2025

  11. Tuesday, July 29, 2025

    “Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more

    activitypub.writeworks.uk/2025

  12. 實作更多功能的 curl-impersonate fork

    從「Curl-Impersonate (github.com/lexiforest)」這邊看到的消息。

    前情提要可以在「修正 Curl 的 TLS handshake,避開 bot 偵測機制」這邊看到,當時介紹了 curl-impersonate 這個專案,可以修改 TLS 的行為 (尤其是 handshake 階段),讓

    blog.gslin.org/archives/2024/1

    #Browser #Computer #GoogleChrome #Murmuring #Network #Privacy #Security #Software #WWW #curl #fingerprint #fork #impersonate #ja3 #ja4 #tls

  13. 實作更多功能的 curl-impersonate fork

    從「Curl-Impersonate (github.com/lexiforest)」這邊看到的消息。

    前情提要可以在「修正 Curl 的 TLS handshake,避開 bot 偵測機制」這邊看到,當時介紹了 curl-impersonate 這個專案,可以修改 TLS 的行為 (尤其是 handshake 階段),讓

    blog.gslin.org/archives/2024/1

    #Browser #Computer #GoogleChrome #Murmuring #Network #Privacy #Security #Software #WWW #curl #fingerprint #fork #impersonate #ja3 #ja4 #tls

  14. 實作更多功能的 curl-impersonate fork

    從「Curl-Impersonate (github.com/lexiforest)」這邊看到的消息。

    前情提要可以在「修正 Curl 的 TLS handshake,避開 bot 偵測機制」這邊看到,當時介紹了 curl-impersonate 這個專案,可以修改 TLS 的行為 (尤其是 handshake 階段),讓

    blog.gslin.org/archives/2024/1

    #Browser #Computer #GoogleChrome #Murmuring #Network #Privacy #Security #Software #WWW #curl #fingerprint #fork #impersonate #ja3 #ja4 #tls

  15. 實作更多功能的 curl-impersonate fork

    從「Curl-Impersonate (github.com/lexiforest)」這邊看到的消息。

    前情提要可以在「修正 Curl 的 TLS handshake,避開 bot 偵測機制」這邊看到,當時介紹了 curl-impersonate 這個專案,可以修改 TLS 的行為 (尤其是 handshake 階段),讓

    blog.gslin.org/archives/2024/1

    #Browser #Computer #GoogleChrome #Murmuring #Network #Privacy #Security #Software #WWW #curl #fingerprint #fork #impersonate #ja3 #ja4 #tls

  16. 實作更多功能的 curl-impersonate fork

    從「Curl-Impersonate (github.com/lexiforest)」這邊看到的消息。

    前情提要可以在「修正 Curl 的 TLS handshake,避開 bot 偵測機制」這邊看到,當時介紹了 curl-impersonate 這個專案,可以修改 TLS 的行為 (尤其是 handshake 階段),讓

    blog.gslin.org/archives/2024/1

    #Browser #Computer #GoogleChrome #Murmuring #Network #Privacy #Security #Software #WWW #curl #fingerprint #fork #impersonate #ja3 #ja4 #tls