We all migrate to smaller websites try not to post outside drawing attention just to hide from the “Ai” crawlers. The internet seems dead except for the few pockets we each know existed away from the clankers

  • daniskarma@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    101
    ·
    6 hours ago

    I have a testing website. I have never gave the address to absolutely anyone, ever. It’s not linked with anything. It’s just a silly html site living in a domain.

    It’s still being ping and probed to death by bad actors. No necessarily AI scrappers. But it’s dozens or hundreds of http petitions a day for random places all over the world.

    There’s no black forest. It’s all light up and under constant attack, every tree is already on fire.

    • dual_sport_dork 🐧🗡️@lemmy.world
      link
      fedilink
      English
      arrow-up
      42
      ·
      5 hours ago

      That’s because it’s numerically possible to sweep through the entire IPv4 address range fairly trivially, especially if you do it in parallel with some kind of botnet, proverbially jiggling the digital door handles of every server in the world to see if any of them happen to be unlocked.

      One wonders if switching to purely IPv6 will forestall this somewhat, as the number space is multiple orders of magnitude larger. That’s only security through obscurity, though, and it’s certain the bots will still find you eventually. Plus, if you have a doman name the attackers already know where you are — they can just look up your DNS record, which is what DNS records are for.

      • kazaika@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 hours ago

        Servers which are meant to be secure usually are configured to not react to pings and do not give out failure responses to unauthenticated requests. This should be viable for a authenticated only walled garden type website op is suggesting, no?

      • kossa@feddit.org
        link
        fedilink
        arrow-up
        2
        ·
        4 hours ago

        But an IP can have multiple websites and even not return anything on plain IP access. How do crawlers find out about domains and unlinked subdomains? Do they even?

      • friend_of_satan@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        48 minutes ago

        If it’s https it’s discoverable by hostname.

        https://0xffsec.com/handbook/information-gathering/subdomain-enumeration/#certificate-transparency

        Certificate Transparency (CT) is an Internet security standard and open-source framework for monitoring and auditing digital certificates. It creates a system of public logs to record all certificates issued by publicly trusted CAs, allowing efficient identification of mistakenly or maliciously issued certificates.

      • dual_sport_dork 🐧🗡️@lemmy.world
        link
        fedilink
        English
        arrow-up
        29
        ·
        5 hours ago

        Almost certainly. There are only 4,294,967,296 possible IPv4 addresses, i.e. 4.3ish billion, which sounds like a lot but in computer terms really isn’t. You can scan them in parallel, and if you’re an advanced script kiddie you could even exclude ranges that you know belong to unexciting organizations like Google and Microsoft, which are probably not worth spending your time messing with.

        If you had a botnet of 8,000 or so devices and employed a probably unrealistically generous timeout of 15 seconds, i.e. four attempts per minute per device, you could scan the entire IPv4 range in just a hair over 93 days and that’s before excluding any known pointless address blocks. If you only spent a second on each ping you could do it in about six days.

        For the sake of argument, cybercriminals are already operating botnets with upwards of 100,000 compromised machines doing their bidding. That bidding could well be (and probably is) probing random web servers for vulnerabilities. The largest confirmed botnet was the 911 S5 which contained about 19 million devices.

        • Melobol@lemmy.ml
          link
          fedilink
          arrow-up
          10
          ·
          4 hours ago

          That’s amazing and scary at the same time. Thanks for putting it into perspective!

        • kossa@feddit.org
          link
          fedilink
          arrow-up
          2
          ·
          4 hours ago

          But there can be multiple websites behind one IP address?! They would not show when onhy accessing the IP. Tenhey would need to know about the domains somehow.

  • crandlecan@mander.xyz
    link
    fedilink
    arrow-up
    36
    ·
    6 hours ago

    Fabulous insight. I think that would make me very happy. Bring back the forests! Burn down the Nazi trees!

  • Jo Miran@lemmy.ml
    link
    fedilink
    arrow-up
    8
    ·
    4 hours ago

    Cyberpunk as a literary genre, and the Cyberpunk TTRPG in specific, are incredibly prophetic. In the Cyberpunk TTRPG (which predates the WWW), “the net” is eventually condemned (as in boarded up) because of AI and ia replaced by silo’d networks (think extended intranets).

  • Brkdncr@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    5 hours ago

    Back in the days of dial up and bbs this was a problem but you would still get robots trying to connect to modems by dialing every phone number possible.

    • friend_of_satan@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      45 minutes ago

      War dialing! Those were the days. I lived in a city where war dialing was illegal, but that didn’t stop me… maybe that’s just an admission of stupidity though. Definitely had some cool stuff come from it though.

  • minorkeys@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    3 hours ago

    Disconnection is the only solution, walled gardens, paid or by invite, that prevent all the shit corporate America fills the commons with.