this post was submitted on 08 Mar 2024
132 points (96.5% liked)
Technology
59589 readers
3077 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It blows my mind that they need to do this with physical phones. I would have thought they could virtualise/emulate everything needed.
Software can detect the hardware it's being run on. I imagine that massive amounts of targeted clicks and views detected from x86, or emulated Android, would trigger fraud alerts.
Additionally, phones are cheap and use a lot less power then the x86 cluster required to replicate that many "individual" users/devices.
On top of that, they pay these people so little that it's cheaper to hire 50 of them for a year than to hire one person to run an operation like that for the same time.
You can always spoof what software sees, but I guess this hackery development of spoofing tools would be more expensive than doing it on physical phones.