this post was submitted on 29 Aug 2023
626 points (98.8% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54698 readers
363 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Newpipe is accessing the videos straight from the backend. There is no chance to splice any ads into, unless youtube were to modify the source material, and that's highly inconvenient. And then we'd just use sponsorblock anyway.
They tried to change the code to access the raw video material many times over, but unless they encrypt it and enforce decryption via keys uniquely embedded in the official youtube app while somehow finding a way to prevent a disassembly to use their keys in unofficial apps, I don't see that happening.
They don't need to splice ads in, they could just render NewPipe inoperable. I'm sure it would be fairly trivial to detect which page loads are from NewPipe.
Not trivial at all, else they'd have done that already instead of playing cat & mouse. How would they differentiate whether it's the official app, some mobile browser, or newpipe? Changing the user agent or cloning a fingerprint from a browser is the trivial thing here.
Have you heard of shape from f5 or similar services?
Nope, what's that?
Well if they're detecting active ad blockers then presumably they're running some client side js to decode the url if certain conditions are met.
I don't think think they've been playing cat & mouse with newpipe, they just break it by accident.