this post was submitted on 31 Oct 2023
782 points (95.6% liked)

Technology

59588 readers
3727 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] ReginaPhalange@lemmy.world 4 points 1 year ago (2 children)

Question. Wouldn't the catch-all solution for YT is to pair the AJAX calls for the video with a "view video key", and that key to be found out after running a deeply obviouscated javascript served with the html of the "view video" page?

They could even bundle some of the key-building-js with the ad being served.

At some point in order to "block the ad" , the ad blocker would have to run or analyze tons of JS code , making the ordeal to difficult to compute.

[–] Corngood@lemmy.ml 6 points 1 year ago

My guess is they can't afford the complication on the server side.

They could probably force the ad to be decoded by asking the client for proof. They couldn't prove that it was actually shown to the user though.

What I don't understand is why they don't block downloading the video during the period where an ad is supposed to be playing.

[–] cypherpunks@lemmy.ml 6 points 1 year ago

I think that is actually what they've already been doing for at least a decade?

Whenever you download a youtube video using something other than a js-enabled browser, then I think something like yt-dlp's jsinterp.py needs to evaluate some javascript to extract the key.