this post was submitted on 02 Dec 2023
786 points (97.9% liked)

Technology

59414 readers
4014 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Inside the 'arms race' between YouTube and ad blockers / Against all odds, open source hackers keep outfoxing one of the wealthiest companies.::YouTube's dramatic content gatekeeping decisions of late have a long history behind them, and there's an equally long history of these defenses being bypassed.

you are viewing a single comment's thread
view the rest of the comments
[–] Ookami38@sh.itjust.works 31 points 11 months ago (2 children)

"against all odds" my left asshole. This is always the way of hacker vs defense, it's always an arms race and the attacking side always has the advantage.

[–] dosaki@lemmy.world 18 points 11 months ago (1 children)

How many assholes do you have?

[–] Dempf@lemmy.zip 12 points 11 months ago (1 children)
[–] Ookami38@sh.itjust.works 8 points 11 months ago* (last edited 11 months ago)

And a center one. Well, that's what I call myself. The central asshole.

[–] RazorsLedge@lemmy.world 1 points 11 months ago (1 children)

Not really. There are lots of protocols and such that haven't been broken in any meaningful ways. Attackers have advantage is a weird thing to say.

[–] Ookami38@sh.itjust.works 1 points 11 months ago

Defense is always playing reactive. Attack gets to be creative and figure out how to break whatever tools defense has. Defense has to wait until the vulnerability is found and then deal with it. It's the nature of the arms race with regards to cyber security.