• Bennyboybumberchums@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    9 days ago

    They always could. What appears to be happening is that channels now have the option to turn on “a switch” so that content wont play if a VPN is detected. Most VPN ip addresses are well known, because they arent a secret. Everyone who uses the VPN goes through it.

    If you come across the above message, its because the content creator turned it on. I had it come up with “stick to football”. Its the only thing that it comes up with. I just unsubbed and wont watch anymore. Im not turning off my VPN for anyone or anything. Id rather just go with out. I encourage all of you to do the same.

    • GenosseFlosse@feddit.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      8 days ago

      You could probably just record the users ID and it’s IP address. IP addresses that see a lot of different user IDs are either VPNs, companies or universities.

      • finitebanjo@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 days ago

        Another thing that only very large companies can do is see the response time and compare packet size from different servers to narrow down your location, effectively defeating the VPN in a lot of cases.

        Hypothetically, a specific amount of bytes gets sent to server B, response time indicates it was received 300 miles away which matches the response time of going from Server B to Server A where the user lives.

        Of course it’s still important to use a VPN, if only because those big companies don’t want us to.

        • i_am_not_a_robot@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 days ago

          The latency to your VPN server is a constant added to the latency between your VPN server and whatever servers you are connected to. As long as the user’s VPN service doesn’t use different VPN servers for different destinations, it is impossible to determine the location of the user behind the VPN based on latency, and in general it is impossible to determine how far a user is from their VPN server because of varying latency introduced by the user’s own network or by bad infrastructure at the local ISP level. You can only know how far they aren’t based on the speed of light across the surface of the earth.

          But, without a VPN, this is a real attack that was proven by a high school student using some quirks of Discord CDNs. Even without using Discord’s CDNs, if somebody wanted to locate web visitors using this technique, they could just rent CDN resources like nearly every big company is doing. Of course, if you have the opportunity to pull this off, you normally have the user’s IP address and don’t care about inferring the location by latency. The reason why it was notable with Discord was because the attacker was not able to obtain the victim’s IP address.

          • finitebanjo@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            8 days ago

            You say what I described is impossible but it’s been demonstrated by researchers such as “CPV: Delay-Based Location Verification for the Internet” by AbdelRahman Abdou with the Department of Systems and Computer Engineering, Carleton University Ontario.

            Furthermore, on top of that method, if a company has access to data from servers in multiple places along the chain between endpoints, then they can see that a series of packets of specific size are traveling in a specific direction, narrowing down the location of the other endpoint. A company like Amazon, whose AWS servers make up almost 30% of the internet.

            One of the more convoluted methods to defeat this approach was to simply add more stops along the chain, fragment the encrypted data into multiple parts, and pass it along random paths to the endpoint. I believe, but I could be wrong, that Tor utilizes this method. The problem with that is: it’s slower.

        • Seefoo@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 days ago

          This…sounds a bit like bs. Can you share a more detailed writeup? At best you could get a radius, but that wouldn’t really be helpful

          • rami@ani.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            8 days ago

            I imagine they could compile large datasets of ping times and server locations and do some extrapolation. I don’t think it ever goes past a best guess but they’d have an idea (if what this person said actually happens).

            • lazylion_ca@lemmy.ca
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              8 days ago

              Companies dont really need to know where you are. They just need to know where you aren’t. If you are not within a certain threshold of response time to certain cdn servers, then its reasonable to assume that you are outside their contractually obligated broadcast region.

          • finitebanjo@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 days ago

            Yeah there was a cool paper on Delay Response method by AbdelRahman Abdou with Department of Systems and Computer Engineering, Carleton University called “CPV: Delay-Based Location Verification for the Internet”.

            The other method I mentioned, checking packet size and general direction, would require accessing data along multiple stops before reaching the other endpoint with which to compare the sizes of encrypted data packets and use that to identify what is traveling where, which either has not been demonstrated or the companies utilizing it haven’t admitted to it, yet. It’s not a stretch to think it’s happening, though, with massive companies like AWS and CloudFlare or telecom giants like AT&T.

      • fatalicus@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 days ago

        Or they are just home users behind a CGNAT, which more and more ISPs use.

        And even if they aren’t, home users usually have dynamic IPs, meaning it can change.

  • FreddiesLantern@leminal.space
    link
    fedilink
    English
    arrow-up
    19
    ·
    8 days ago

    Oh, so what they’re really saying is that a platform owned by GOOGLE has trouble FINDING the best content?

    Everyone knows.

  • Matt@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    8 days ago

    It’s time to switch to Newpipe or Invidious, YouTube clients focused on privacy, without adverts and without Google’s clutches.

  • unexposedhazard@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    15
    ·
    9 days ago

    This isnt new. Its been happening for years. There is a post about this on lemmy every few weeks. It just doesnt happen consistently, so people always think that they “discovered” this for the first time.

      • brucethemoose@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        9 days ago

        What about people living in a country where youtube is blocked. I guess Google just says “fuck 'em”?

        Yyep.

        If you’re using a VPN, you’re likely anonymized and not directly making YouTube any money. Those are leeches, as far as a Google accountant is concerned.

        • Haystack@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          9 days ago

          They said logging in doesn’t make it go away. Being logged in means they can already track you, so this is pretty ridiculous of them tbh.

          • DrDystopia@lemy.lol
            link
            fedilink
            English
            arrow-up
            3
            ·
            9 days ago

            Being logged in means they can track what you watch. Being logged in via a VPN means they can’t track your location.

            Literally valuable information.

      • Miles O'Brien@startrek.website
        link
        fedilink
        English
        arrow-up
        6
        ·
        9 days ago

        I guess Google just says “fuck 'em”?

        Yes, 100%, absokutely correct.

        Google is a company.

        Companies do not care about you. You are not a person, you are a number.

        • huppakee@piefed.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          9 days ago

          Google is a company multi-billion dollar corporation.

          Companies Multi-billion dollar corporations do not care about you. You are not a person, you are a number.

          (Well ok, there is plenty of small business who also don’t care about you, that’s not my point).

      • SmokeyDope@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 days ago

        A few days ago I gotta message from google saying they “can’t verify my age” (meaning they want gov ID I’m sure) so I’m forced to use safe search and other stuff too.

        Fuck. That!

  • Kissaki@feddit.org
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    9 days ago

    The real highlight is the contradictory text.

    To continue, turn off your VPN/Proxy. This will allow YouTube to locate the best content".

    “We refuse to serve you anything other than the best ‘located content’.”

    A fat lie. Combining refusal with the completely unrelated supposed service improvement of location-based content. To disingenuously sound like they’re doing you a service.

  • Galactose@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    7 days ago

    Listen at this point, we either re-upload our favorite creator’s content to other platforms. Convince them to join alternatives or help out *their replacements" on those alternative platforms to grow.

    Either way I do not respect content-creators that do not support alternative platforms (& decentralization) on principle

    • Mwa@thelemmy.club
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      8 days ago

      Listen at this point, we either re-upload our favorite creator’s content to other platforms. Convince them to join alternatives or help out their replacements on thise alternative platforms to grow.

      I am with this, tired of using a yt frontend to watch videos (sometimes real website), and no reuploads nor have alternatives.

  • utopiah@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    8 days ago

    I mean… detecting (some) VPNs is as trivial as

    fetch('https://github.com/NazgulCoder/IPLists/raw/refs/heads/main/output/vpn-ipv4.txt').then( res => res.text() ).then( res => console.log( res.includes( "1.2.3.4" ) ) )

    thanks to https://github.com/NazgulCoder/IPLists/

    FWIW though I did try, connected via a random VPN from ProtonVPN from Argentina… and it wasn’t in that list. So it’s not perfect. Also ProtonVPN has apparently today 13K servers according to https://protonvpn.com/vpn-servers

    That being said I can imagine that Google, which is literally built on crawling the Web, has all the infrastructure and expertise needed to have such lists and up to date ones.

    I’m not justifying blocking VPN here, only trying to clarify that unless you self-host in a rather specific setup (i.e. not relying a popular cloud provider but truly self hosting) it’s technically not hard to block VPNs.

    • mic_check_one_two@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 days ago

      Yeah, detecting the VPN isn’t really difficult at all. VPN providers sometimes try to cycle through IP addresses to make it harder, but there’s only so much they can do.

      This isn’t really noteworthy, especially when you consider how many services require a sign in when you’re on a VPN anyways. It’s shitty, but not really surprising; They want to be able to tie your traffic to you, not just to a random VPN server. Hell, even without signing in, they probably have your browser fingerprinted. If you’re privacy focused, you probably have a lot of privacy based extensions, in a privacy based browser. And that makes you easy to fingerprint.

  • skuzz@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    7
    ·
    9 days ago

    When I see content blocks like that anymore, I just leave the content behind and go elsewhere. Malicious companies will not get my clicks. They can fuck right off.

    Good sign though, means they are getting desperate. It is our duty to starve them of traffic.

    • definitemaybe@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 days ago

      Sure, but there are also lots of other ways around it. Non-chrome browsers (or Chromium-based browsers) still allow for good extensions that can block YouTube ads.

      Firefox + uBlock Origin still works great, even when all the front-ends are broken.

  • COASTER1921@lemmy.ml
    link
    fedilink
    English
    arrow-up
    7
    ·
    9 days ago

    My ISP has started throttling YouTube to ~2mbps when viewed from desktop. Using a VPN gets around this and lets me watch in HD. Luckily I’ve not encountered this error yet, but if I do I guess it’s no more YouTube for me, 480p is just way too blurry to put up with.

  • A_norny_mousse@feddit.org
    link
    fedilink
    English
    arrow-up
    5
    ·
    9 days ago

    This happens via simple lists of IP addresses, no? I.e. the VPN has a limited number of exit IPs and once it’s known who they belong to, they’re easy to block?