this post was submitted on 13 Aug 2023
1203 points (97.1% liked)

Memes

45190 readers
2805 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 1 year ago (5 children)

Nice. but Unfortunately WEI will detect the header of the request and block site access even with a terminal browser. The end is near.

[–] [email protected] 6 points 1 year ago

That's when we fork the protocol to remove the garbage.

[–] [email protected] 5 points 1 year ago

SearXNG+Peertube/Odyssee+Mastodon+Lemmy/kbin+Radarr++nyaa.si+sonarr+ProtonMail+Krita+Monkrus

Arr me hearties.

[–] [email protected] 4 points 1 year ago

Changing request headers is a trivial thing.

[–] [email protected] 4 points 1 year ago (1 children)
[–] [email protected] 5 points 1 year ago* (last edited 1 year ago) (1 children)

WEI will request a authentication token that will be provided by a third part software like Play Store in Android to certificate that your request is made by you a human and not by a bot so technically spoof the header agent will not be effective. Dark times awaits us my friend. Other problem is how deep embedded in the system this trust agent that provides these tokens will be. It may be embedded in kernel like Easy Anti Cheat for example and this will make the things even worse because they can classify many devices like " not approved " just by not meet software or hardware requirements

[–] [email protected] 0 points 1 year ago (1 children)
[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

It's no so simple, man. The vast majority of users don't have the skills to do this and I think even if you compile the kernel of your personalized system it will not circumvent WEI and it will brake some functionality somehow

[–] [email protected] 0 points 1 year ago

Develop an API which spoofs authorization authentication tokens? Like man in the middle?