Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
infosecprivacyselfhostedfosssurveillance
30 Indlæg 16 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

    You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    #infosec #privacy #selfhosted #foss #surveillance

    dancingtreefrog@mastodon.socialD This user is from outside of this forum
    dancingtreefrog@mastodon.socialD This user is from outside of this forum
    dancingtreefrog@mastodon.social
    wrote sidst redigeret af
    #2

    @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

    k3ym0@infosec.exchangeK 1 Reply Last reply
    0
    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

      You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

      I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

      Claude:

      • Six parallel telemetry pipelines.
      • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
      • Intercom running a persistent WebSocket whether you use it or not.
      • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

      ChatGPT:

      • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
      • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
      • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
      • Also runs a proof-of-work challenge before you're allowed to type anything.

      Gemini:

      • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
      • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

      When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

      KETCHUP_DISCOVERY_CARD.
      MUSTARD_DISCOVERY_CARD.
      MAYO_DISCOVERY_CARD.

      Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

      All three of these products cost money.
      One of them is also running ad infrastructure.

      Touch grass. Install @ublockorigin

      #infosec #privacy #selfhosted #foss #surveillance

      olivierburnier@mastodon.socialO This user is from outside of this forum
      olivierburnier@mastodon.socialO This user is from outside of this forum
      olivierburnier@mastodon.social
      wrote sidst redigeret af
      #3

      @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

      k3ym0@infosec.exchangeK 1 Reply Last reply
      0
      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

        You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

        I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

        Claude:

        • Six parallel telemetry pipelines.
        • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
        • Intercom running a persistent WebSocket whether you use it or not.
        • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

        ChatGPT:

        • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
        • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
        • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
        • Also runs a proof-of-work challenge before you're allowed to type anything.

        Gemini:

        • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
        • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

        When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

        KETCHUP_DISCOVERY_CARD.
        MUSTARD_DISCOVERY_CARD.
        MAYO_DISCOVERY_CARD.

        Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

        All three of these products cost money.
        One of them is also running ad infrastructure.

        Touch grass. Install @ublockorigin

        #infosec #privacy #selfhosted #foss #surveillance

        nazokiyoubinbou@urusai.socialN This user is from outside of this forum
        nazokiyoubinbou@urusai.socialN This user is from outside of this forum
        nazokiyoubinbou@urusai.social
        wrote sidst redigeret af
        #4

        @k3ym0 I get no trackers and no fees with KoboldCPP. 🤪

        1 Reply Last reply
        0
        • dancingtreefrog@mastodon.socialD dancingtreefrog@mastodon.social

          @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

          k3ym0@infosec.exchangeK This user is from outside of this forum
          k3ym0@infosec.exchangeK This user is from outside of this forum
          k3ym0@infosec.exchange
          wrote sidst redigeret af
          #5

          @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config 🙂

          dancingtreefrog@mastodon.socialD 1 Reply Last reply
          0
          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

            You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

            I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

            Claude:

            • Six parallel telemetry pipelines.
            • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
            • Intercom running a persistent WebSocket whether you use it or not.
            • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

            ChatGPT:

            • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
            • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
            • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
            • Also runs a proof-of-work challenge before you're allowed to type anything.

            Gemini:

            • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
            • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

            When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

            KETCHUP_DISCOVERY_CARD.
            MUSTARD_DISCOVERY_CARD.
            MAYO_DISCOVERY_CARD.

            Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

            All three of these products cost money.
            One of them is also running ad infrastructure.

            Touch grass. Install @ublockorigin

            #infosec #privacy #selfhosted #foss #surveillance

            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.social
            wrote sidst redigeret af
            #6

            @k3ym0 oh man, is all of this just in the js console? i wanna see 😄

            k3ym0@infosec.exchangeK 1 Reply Last reply
            0
            • viss@mastodon.socialV viss@mastodon.social

              @k3ym0 oh man, is all of this just in the js console? i wanna see 😄

              k3ym0@infosec.exchangeK This user is from outside of this forum
              k3ym0@infosec.exchangeK This user is from outside of this forum
              k3ym0@infosec.exchange
              wrote sidst redigeret af
              #7

              @Viss ask and you shall receive.

              1 Reply Last reply
              0
              • olivierburnier@mastodon.socialO olivierburnier@mastodon.social

                @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

                k3ym0@infosec.exchangeK This user is from outside of this forum
                k3ym0@infosec.exchangeK This user is from outside of this forum
                k3ym0@infosec.exchange
                wrote sidst redigeret af
                #8

                @OlivierBurnier @ublockorigin

                Mistral: two blocked requests.

                Cloudflare Insights ("is the site up") and a single Intercom beacon POST that didn't even retry.

                that's it. no Statsig. no tracking GIFs. no Google Analytics. no distributed tracing. no proof-of-work challenge. no KETCHUP_DISCOVERY_CARD. nothing.

                a French AI company nobody talks about is running the cleanest frontend in the entire field by a factor of roughly 150x and we're all sleeping on it

                les français ont tout compris

                #mistral #privacy #infosec

                1 Reply Last reply
                0
                • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                  You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                  I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                  Claude:

                  • Six parallel telemetry pipelines.
                  • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                  • Intercom running a persistent WebSocket whether you use it or not.
                  • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                  ChatGPT:

                  • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                  • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                  • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                  • Also runs a proof-of-work challenge before you're allowed to type anything.

                  Gemini:

                  • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                  • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                  When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                  KETCHUP_DISCOVERY_CARD.
                  MUSTARD_DISCOVERY_CARD.
                  MAYO_DISCOVERY_CARD.

                  Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                  All three of these products cost money.
                  One of them is also running ad infrastructure.

                  Touch grass. Install @ublockorigin

                  #infosec #privacy #selfhosted #foss #surveillance

                  zennblack@freeatlantis.comZ This user is from outside of this forum
                  zennblack@freeatlantis.comZ This user is from outside of this forum
                  zennblack@freeatlantis.com
                  wrote sidst redigeret af
                  #9

                  @k3ym0 @ublockorigin
                  I don't understand all of that but it sounds worse than what Snowden told us!

                  1 Reply Last reply
                  0
                  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                    @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config 🙂

                    dancingtreefrog@mastodon.socialD This user is from outside of this forum
                    dancingtreefrog@mastodon.socialD This user is from outside of this forum
                    dancingtreefrog@mastodon.social
                    wrote sidst redigeret af
                    #10

                    @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

                    maddad@mastodon.worldM k3ym0@infosec.exchangeK 2 Replies Last reply
                    0
                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                      You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                      I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                      Claude:

                      • Six parallel telemetry pipelines.
                      • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                      • Intercom running a persistent WebSocket whether you use it or not.
                      • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                      ChatGPT:

                      • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                      • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                      • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                      • Also runs a proof-of-work challenge before you're allowed to type anything.

                      Gemini:

                      • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                      • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                      When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                      KETCHUP_DISCOVERY_CARD.
                      MUSTARD_DISCOVERY_CARD.
                      MAYO_DISCOVERY_CARD.

                      Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                      All three of these products cost money.
                      One of them is also running ad infrastructure.

                      Touch grass. Install @ublockorigin

                      #infosec #privacy #selfhosted #foss #surveillance

                      siklist@social.cologneS This user is from outside of this forum
                      siklist@social.cologneS This user is from outside of this forum
                      siklist@social.cologne
                      wrote sidst redigeret af
                      #11

                      @k3ym0

                      I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

                      k3ym0@infosec.exchangeK 1 Reply Last reply
                      0
                      • siklist@social.cologneS siklist@social.cologne

                        @k3ym0

                        I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

                        k3ym0@infosec.exchangeK This user is from outside of this forum
                        k3ym0@infosec.exchangeK This user is from outside of this forum
                        k3ym0@infosec.exchange
                        wrote sidst redigeret af
                        #12

                        @siklist pihole can block requests by fqdn, but as you’ll notice, a lot of the third-party tracking infra was being proxied through other non-tracking infra to get around this. If Claude code is somehow loading in JS artifacts (idk if it can or not) it could bypass pihole.

                        1 Reply Last reply
                        0
                        • dancingtreefrog@mastodon.socialD dancingtreefrog@mastodon.social

                          @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

                          maddad@mastodon.worldM This user is from outside of this forum
                          maddad@mastodon.worldM This user is from outside of this forum
                          maddad@mastodon.world
                          wrote sidst redigeret af
                          #13

                          @dancingtreefrog @k3ym0 @ublockorigin

                          This will help a lot too.. Its an AI block list.

                          https://github.com/laylavish/uBlockOrigin-HUGE-AI-Blocklist

                          1 Reply Last reply
                          0
                          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                            You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                            I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                            Claude:

                            • Six parallel telemetry pipelines.
                            • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                            • Intercom running a persistent WebSocket whether you use it or not.
                            • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                            ChatGPT:

                            • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                            • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                            • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                            • Also runs a proof-of-work challenge before you're allowed to type anything.

                            Gemini:

                            • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                            • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                            When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                            KETCHUP_DISCOVERY_CARD.
                            MUSTARD_DISCOVERY_CARD.
                            MAYO_DISCOVERY_CARD.

                            Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                            All three of these products cost money.
                            One of them is also running ad infrastructure.

                            Touch grass. Install @ublockorigin

                            #infosec #privacy #selfhosted #foss #surveillance

                            itsmaya@social.treehouse.systemsI This user is from outside of this forum
                            itsmaya@social.treehouse.systemsI This user is from outside of this forum
                            itsmaya@social.treehouse.systems
                            wrote sidst redigeret af
                            #14

                            @k3ym0 @ublockorigin
                            > Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.

                            I was working on an internal analytics dashboard at some other Very Large Company What Competes With Google and someone pushed a change to fetch and run an analytics package directly from Google servers. I had to spend almost a week ripping out their changes and redoing the analytics using a lib that wasn't directly sourced from our primary competition (also I'm pretty sure the way it was used violated it's license).

                            So yea my lack of surprise is palpable.

                            1 Reply Last reply
                            0
                            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                              You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                              I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                              Claude:

                              • Six parallel telemetry pipelines.
                              • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                              • Intercom running a persistent WebSocket whether you use it or not.
                              • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                              ChatGPT:

                              • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                              • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                              • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                              • Also runs a proof-of-work challenge before you're allowed to type anything.

                              Gemini:

                              • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                              • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                              When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                              KETCHUP_DISCOVERY_CARD.
                              MUSTARD_DISCOVERY_CARD.
                              MAYO_DISCOVERY_CARD.

                              Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                              All three of these products cost money.
                              One of them is also running ad infrastructure.

                              Touch grass. Install @ublockorigin

                              #infosec #privacy #selfhosted #foss #surveillance

                              sergiodomeyko@mastodon.onlineS This user is from outside of this forum
                              sergiodomeyko@mastodon.onlineS This user is from outside of this forum
                              sergiodomeyko@mastodon.online
                              wrote sidst redigeret af
                              #15

                              @k3ym0 can you translate for us older genx non computer folks? thanks

                              k3ym0@infosec.exchangeK 1 Reply Last reply
                              0
                              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                                I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                                Claude:

                                • Six parallel telemetry pipelines.
                                • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                                • Intercom running a persistent WebSocket whether you use it or not.
                                • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                                ChatGPT:

                                • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                                • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                                • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                                • Also runs a proof-of-work challenge before you're allowed to type anything.

                                Gemini:

                                • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                                • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                                When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                                KETCHUP_DISCOVERY_CARD.
                                MUSTARD_DISCOVERY_CARD.
                                MAYO_DISCOVERY_CARD.

                                Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                                All three of these products cost money.
                                One of them is also running ad infrastructure.

                                Touch grass. Install @ublockorigin

                                #infosec #privacy #selfhosted #foss #surveillance

                                candlesarg@mastodon.socialC This user is from outside of this forum
                                candlesarg@mastodon.socialC This user is from outside of this forum
                                candlesarg@mastodon.social
                                wrote sidst redigeret af
                                #16

                                @k3ym0 @ublockorigin lowkey curious about lumo ai by proton

                                k3ym0@infosec.exchangeK 1 Reply Last reply
                                0
                                • sergiodomeyko@mastodon.onlineS sergiodomeyko@mastodon.online

                                  @k3ym0 can you translate for us older genx non computer folks? thanks

                                  k3ym0@infosec.exchangeK This user is from outside of this forum
                                  k3ym0@infosec.exchangeK This user is from outside of this forum
                                  k3ym0@infosec.exchange
                                  wrote sidst redigeret af
                                  #17

                                  @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

                                  those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

                                  you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

                                  uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it 🙂

                                  hope that helps. welcome to the modern internet - it’s a mess out here.

                                  sergiodomeyko@mastodon.onlineS joseph11lim@mastodon.socialJ 2 Replies Last reply
                                  0
                                  • jakebrake@ohai.socialJ This user is from outside of this forum
                                    jakebrake@ohai.socialJ This user is from outside of this forum
                                    jakebrake@ohai.social
                                    wrote sidst redigeret af
                                    #18

                                    @cloud @k3ym0 @OlivierBurnier @ublockorigin

                                    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

                                    k3ym0@infosec.exchangeK 1 Reply Last reply
                                    0
                                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                      @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

                                      those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

                                      you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

                                      uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it 🙂

                                      hope that helps. welcome to the modern internet - it’s a mess out here.

                                      sergiodomeyko@mastodon.onlineS This user is from outside of this forum
                                      sergiodomeyko@mastodon.onlineS This user is from outside of this forum
                                      sergiodomeyko@mastodon.online
                                      wrote sidst redigeret af
                                      #19

                                      @k3ym0 thank you. For your explanation. I will look into it.

                                      1 Reply Last reply
                                      0
                                      • jakebrake@ohai.socialJ jakebrake@ohai.social

                                        @cloud @k3ym0 @OlivierBurnier @ublockorigin

                                        Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

                                        k3ym0@infosec.exchangeK This user is from outside of this forum
                                        k3ym0@infosec.exchangeK This user is from outside of this forum
                                        k3ym0@infosec.exchange
                                        wrote sidst redigeret af
                                        #20

                                        @jakebrake @cloud @OlivierBurnier @ublockorigin i’m fucking terrified to ask why you know that.

                                        1 Reply Last reply
                                        0
                                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                          You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                                          I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                                          Claude:

                                          • Six parallel telemetry pipelines.
                                          • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                                          • Intercom running a persistent WebSocket whether you use it or not.
                                          • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                                          ChatGPT:

                                          • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                                          • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                                          • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                                          • Also runs a proof-of-work challenge before you're allowed to type anything.

                                          Gemini:

                                          • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
                                          • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                                          When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                                          KETCHUP_DISCOVERY_CARD.
                                          MUSTARD_DISCOVERY_CARD.
                                          MAYO_DISCOVERY_CARD.

                                          Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                                          All three of these products cost money.
                                          One of them is also running ad infrastructure.

                                          Touch grass. Install @ublockorigin

                                          #infosec #privacy #selfhosted #foss #surveillance

                                          Q This user is from outside of this forum
                                          Q This user is from outside of this forum
                                          quercusmacrocarpa@mastodon.social
                                          wrote sidst redigeret af
                                          #21

                                          @k3ym0 @ublockorigin Fascinating and worrisome. For the less technically adept… would uMatrix be as effective? Or are these specific capabilities of uBO?

                                          k3ym0@infosec.exchangeK 1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper