A dark adtech empire fed by fake CAPTCHAs
Fake CAPTCHAs & user confusion
- “Click to prove you’re human” is seen as a clever attack because the modern web already trains users to click through CAPTCHAs, buttons, and arbitrary hoops.
- Non‑technical and older users are especially vulnerable; they’ve learned that refusing permissions or dialogs can break essential apps (e.g., calls not ringing), so they default to “Allow.”
Permission Prompts & Habituation
- Commenters note we already knew users mindlessly click “OK/Allow,” yet design and regulation kept adding more prompts (permissions, cookie banners).
- Debate over alternatives:
- Auto‑deny breaks apps and is hard to debug/override for normal users.
- Auto‑allow is worse due to abuse and tracking.
- Some praise iOS’s repeated prompts for sensitive permissions; others call for TTLs, “allow once/session/timeframe,” and clearer global controls.
Push Notifications as an Attack Surface
- Multiple stories of elderly users’ desktops being overrun by scammy browser notifications that look like native OS alerts (“SECURITY ALERT!! CALL NOW”).
- Many see general‑purpose web push as “one of the worst features of the modern web,” with maybe email/chat/financial alerts as marginally valid.
- Others argue for legitimate uses (news, flights, YouTube, messaging), but there’s low trust that companies will restrain themselves from turning them into ad channels.
- Some suggest:
- Blocking all notification requests by default.
- Allowing notifications only for PWAs the user explicitly installs.
- Using badges/pinned tabs instead of OS‑style popups.
Browser Capabilities & Web Platform Creep
- Strong criticism that untrusted JS can trigger OS‑like notifications and access things like battery or fonts; belief that adtech steers standards.
- Counterargument: some APIs are genuinely useful, but should be permission‑gated, possibly returning fake data on denial.
- Overall concern that browsers now execute hostile code with too many knobs, while permission UX is opaque and inconsistent across features.
Redirect Chains & Traffic Distribution Systems
- Readers ask why scam links bounce through many domains.
- Proposed reasons: multiple ad impressions, bypassing initial checks, user‑agent/IP targeting, setting first‑party cookies, and tracking/monetization.
- Comparisons to convoluted SSO flows (Okta, universities, Microsoft) that normalize long redirect chains and erode user suspicion.
Mitigations: Ad Blocking & Configuration
- Many advocate adblockers and DNS‑level blocking (uBlock Origin, NextDNS, VPN‑based blockers, Safari content blockers) as primary defense, especially for at‑risk relatives.
- Challenges: older users cling to familiar browsers (often Chrome) and resist switching, limiting effective protection.
Regulation, UX, and Article Critique
- EU cookie rules are blamed for normalizing popups/dark patterns; others reply that the intent was user‑friendly and site operators chose hostile implementations.
- Some praise the article as a useful warning; others find it vague, alarmist, and light on technical detail, claiming this is a recurring pattern.