top | item 44422356

Reverse Engineering Vercel's BotID

109 points| hazebooth | 8 months ago |nullpt.rs

18 comments

order

ATechGuy|8 months ago

> At the moment, it seems Basic mode is so basic that it allows everything to pass as human. That’ll likely change as they gather more telemetry to better identify what a bot signal looks like.

So they are basically collecting telemetry in the name of "free basic anti-bot" solution.

cchance|8 months ago

free basic anti-bot solution that literally NEVER BLOCKS A BOT, like what the actual fuck

codedokode|8 months ago

Note that the bot detection script uses WebGL to obtain GPU name. I assume this (fingerprinting) is the most popular use of WebGL. Sad that independent browsers like Firefox do not supply fake values.

grishka|8 months ago

IMO the use of <canvas> needs to be behind a permission prompt, the same as e.g. geolocation or WebRTC. Few websites actually need canvas/WebGL for legitimate purposes.

b0a04gl|8 months ago

why is bot detection even happening at render time instead of request time. why can't tell you’re a bot from your headers, UA, IP, TLS fingerprint. imo making it a surveillance. 'you're a bot, ok not just go away, let’s fingerprint your GPU and assign you a behavioral risk score anyway'

n2d4|8 months ago

It's really hard to detect it at request time. It's practically trivial for an attacker to fake headers to resemble a real browser.