←back to thread

550 points polskibus | 2 comments | | HN request time: 0.454s | source
Show context
minimaxir ◴[] No.19116441[source]
This example is likely not specifically targeting ad blockers, but ad scrapers for transparency: https://www.propublica.org/article/facebook-blocks-ad-transp...

> Our tool recognized ads by searching for that word. Last year, Facebook added invisible letters to the HTML code of the site. So, to a computer, the word registered as “SpSonSsoSredS.”

That article also links to this tweet in that paragraph.

replies(2): >>19116776 #>>19119051 #
tvanantwerp ◴[] No.19116776[source]
> We have collected more than 100,000 political ads in this way. But Facebook’s latest update blocks tools like ours from clicking on the “Why Am I Seeing This” menu.

> The company added code that prevents clicks generated by computers — including browser extensions — on just that one button. Web browsers make a distinction between a click generated by the computer and one generated by your mouse. Clicks from your mouse are marked “isTrusted“ and those generated by computer code are not.

replies(2): >>19117229 #>>19123478 #
1. megous ◴[] No.19117229[source]
You can patch the browser to make isTrusted configurable, or to set it unconditionally true.
replies(1): >>19119770 #
2. the8472 ◴[] No.19119770[source]
In my opinion extensions should be able to synthesize clicks on behalf of the user where isTrusted=true from the perspective of web content.