

On the frontend.
On the frontend.
Because of the CORS settings on Google’s servers would tell your browser to not go forward with the request. There are two ways it could eventually be possible:
Fair enough, that’s interesting. I assume this only applies to the non-web clients. On the web, it would not be possible. You can verify by looking at the outgoing network requests on this random video for example: https://invidious.privacyredirect.com/watch?v=qKMcKQCQxxI
I’m pretty confident that you are wrong.
Invidious and YouTube piped (and LibreTube) by default load the videos server-side, as opposed to GrayJay, NewPipe or Smarttube.
It has advantages (mostly that your IP address is not shared with YouTube, and it allows users from countries where YouTube is blocked to still access it) and inconvenients (much harder to keep up when YouTube actively seeks to block them).
LibreTube is also a good one. Basically an app for piped
Alternatively, in a similar fashion. Use “hail” to auto pause any app you want so they don’t run in the background unintended.
Firefox’s implementation of manifest v3 doesn’t come with the same restriction as Google’s. Ad blockers will still work with manifest v3 on Firefox (but not on chrome).
This means that all manifest v3 extensions made for Chrome work with Firefox, and almost all manifest v3 extensions made for Firefox will work with Chrome.
They already support manifest v3, but with less restrictions than Chrome’s implementation.
Firefox’s implementation of manifest v3 is a bit different than Chrome’s, and still allows for blocking webrequests with no upper limit.
https://blog.mozilla.org/addons/2024/03/13/manifest-v3-manifest-v2-march-2024-update/
https://blog.mozilla.org/addons/2022/05/18/manifest-v3-in-firefox-recap-next-steps/
There is no way a DDoS on the website in affecting the crawler. Also, running a DDoS attack of this size costs a lot of money (if you rent the network, if you own it it costs money as lost sales). No one is giving AI control over a DDoS network to just fuck around.
There is no domain name associated with the IPs.
Most importantly, usually, DDoS attack use infected devices (PCs, mobile phones, smart fridges, shady browser addons etc…) to get so many ip addresses and devices/locations and attack from everywhere at once.
If they make one, you’d have to sideload it.
You can configure it per app. And choose your own block lists.
Even with inflation. Answering captchas for 8 hours a day will get you maybe 100$ a month.
Those “jobs” are meant for third world countries. Even then it’s a pretty low pay.
Answering captchas pays much much less than that.
Kagi is giving out money to Yandex, which is Russian.