by y_gy on 3/1/24, 6:05 PM with 111 comments
by david422 on 3/1/24, 8:20 PM
The second most effective thing is making the malicious actor use some sort of resource. Such as a payment (the author uses), or a time commitment (eg new accounts can only create 1 link a day), or some other source of friction. The idea is that for legitimate users the friction is acceptably low, but for consistent spammers the cost becomes too high.
The 3rd thing I've found effective is that lots of spam comes from robots - or perhaps robots farming tasks to humans. If you can determine how the traffic is coming in and then filter that traffic effectively without indicating failure, robots can happily spam away and you can happily filter away.
by mik3y on 3/1/24, 8:18 PM
A big problem that came up at the domain level was what I'd call
a _trustworthy domain with untrustworthy subdomains_, specifically
where those subdomains represent user-generated content.
The Public Suffix List (PSL) [1] to the rescue! It can help with this kind of disambiguation.Paraphrasing, it's a list of domains where subdomains should be treated as separate sites (e.g. for cookie purposes). So `blogger.com` on the list means `*.blogger.com` are separate "sites".
by JoshTriplett on 3/1/24, 8:10 PM
It made sense back before Twitter had one of their own. And I know that some people use it to get link analytics. I've also occasionally seen it used for printed materials, to get pretty URLs that are easy to hand-type.
People also use it for malicious purposes, such as hiding malware, or disguising referral links, or otherwise trying to obfuscate where a link is going. (Note: I'm not calling referral links malicious, I'm calling disguised referral links malicious.)
Other than printed materials (which need pretty URLs and thus often need a dedicated first-party URL shortener) and analytics, what are people using third-party URL shorteners for today?
by not2b on 3/1/24, 8:46 PM
by Karellen on 3/1/24, 7:52 PM
(Also note the difference between the length of the "Advantages" and "Disadvantages" sections)
by tpurves on 3/1/24, 8:46 PM
by TimLeland on 3/1/24, 8:08 PM
Be careful relying on Stripe to prevent these users. Next they will start using stolen credit cards to create accounts then you will face disputes. If you get too many, Stripe will prevent you from processing payments.
About a year ago, I launched a service called Link Shield. It's an API that returns risk scores (0-100) on URLs. It uses AI and other services to score if a URL is malicious. Check it out and let me know if you would be interested in trying it linkshieldapi.com/
by mid-kid on 3/1/24, 9:04 PM
Established players like bitly and tinyurl didn't have all the resources to deal with the problem when they started out either, and they arguably still don't, yet they get favored by the antivirus vendors and "safe"search blacklists, since they're well-known services. It doesn't seem fair.
Is this really the way it should be? I wonder if they could've explained the situation to the antivirus vendors: The site itself doesn't host malware and doesn't allow the discovery of said malware through its service. It requires a user to receive an exact URL, just like they could've received any other link, and the blocklists should operate on what's hidden behind it instead of the redirect in front. Maybe y.gy could've been hooked into the safesearch API to automatically nuke any URLs blacklisted already by them, or another antivirus vendor.
by butz on 3/1/24, 8:13 PM
by hilux on 3/1/24, 6:53 PM
I prompts me to wonder whether abuse was one reason that Heroku removed their beloved (among students) free tier.
by ay on 3/1/24, 7:52 PM
For the malicious links, did you have a chance to track whether the malware actors verify that their links do not work, e.g. by setting a cookie when they make a link and checking it later ?
I wonder if making these malicious links silently work only for the people that submitted them (and to say “no such link” for everyone else) ought to create a degree of confusion and slow them down to some extent at least…
by urbandw311er on 3/2/24, 12:03 PM
Kinda sad that this is what the online world has become.
And we just put up with it.
Imagine if walking down the road each day was like this – people lining up ready to swindle you or manhandle you in order to steal your things. There would be outrage. But online we have just sort of reached a weird state of acceptance I guess.
by kornhole on 3/1/24, 7:52 PM
The time it took you to write all this evidences the problem with hosting the service publicly.
Yesterday I ran into problem with sharing a link to a simplex.chat group which was so long my website builder translated it incorrectly. I looked at link shorteners publicly available and now understand from your writeup why they are somewhat limited now. I found it easier to just spin up my own link shortener on my webserver using Shuri. It took less than a minute for me install. I won't publicize its availability now that I have read this.
by arccy on 3/1/24, 7:38 PM
by pquki4 on 3/2/24, 2:31 AM
My thoughts after reading the article: I was so right.
by laurent123456 on 3/2/24, 1:45 AM
So for a service at $4 a month which is likely to get a lot of fraudulent payments I wonder if it's really viable.
One thing he should do is immediately cancel accounts and refund subscriptions when there's an early fraud warning. They are usually accurate and help avoiding those fees.
by VyseofArcadia on 3/1/24, 7:46 PM
Many many years ago I ran a small forum for a small webcomic, and one day it was just full of low effort scams and spam. For an audience of, I dunno, a dozen people? I just shut the whole thing down because it wasn't worth our time to do anything about it.
We just can't have nice things, and if you run across something that is actually nice, make sure to thank whoever runs it for all their behind the scenes effort to deal with the scumbags that clog everything, and I mean everything, up with s(p|c)am.
by josefresco on 3/1/24, 9:37 PM
Thankfully after a couple years, I convinced them (it took several tries) to use a 3rd party hosted provider.
Bullet dodged.
by akpa1 on 3/1/24, 8:16 PM
As it turns out, my ISP was simply doing a rubbish job at blocking the site. After a few 10s of tries it eventually managed to redirect me to their warning page and prompted me to turn off settings in my account config. Thanks Virgin Media.
by Vt71fcAqt7 on 3/1/24, 7:48 PM
by nerdbert on 3/1/24, 8:21 PM
by AceJohnny2 on 3/1/24, 8:43 PM
The price of success is you then need to deal with moderation in some form. (and on that note: "it is easier to automate bad behavior than it is to police it")
Right now, "enshittification" is (rightly) on many people's minds, but before that the reason any company makes a process difficult is because some assholes ruined it for the rest of us.
by goth60000 on 3/1/24, 6:33 PM
by schleck8 on 3/1/24, 7:41 PM
by 123yawaworht456 on 3/1/24, 10:18 PM
by gwern on 3/1/24, 9:14 PM