What I'd probably do is go into a Linux container or a Whonix VM and make HTTP requests with falsified user agents or something like that; mind you I'm not an expert, but I feel like that'd at least be the start of a secure way to do it
Probably fine as long as it's not on a real phone. Whether that's even useful activity or not I don't know though, hard to say how that data will look on their side and how easy it will be to discard from the rest of the data.
Anything that wastes even a tiny bit of their time is probably good though.
I feel like something from Tor would be a bit too easy to discard, but I think with a right blend of randomized user agents connecting from common VPNs would be harder to filter out. Would be rad were there a generous gray-hat with a botnet, but I only know stuff from the defense side
What I'd probably do is go into a Linux container or a Whonix VM and make HTTP requests with falsified user agents or something like that; mind you I'm not an expert, but I feel like that'd at least be the start of a secure way to do it
Probably fine as long as it's not on a real phone. Whether that's even useful activity or not I don't know though, hard to say how that data will look on their side and how easy it will be to discard from the rest of the data.
Anything that wastes even a tiny bit of their time is probably good though.
I feel like something from Tor would be a bit too easy to discard, but I think with a right blend of randomized user agents connecting from common VPNs would be harder to filter out. Would be rad were there a generous gray-hat with a botnet, but I only know stuff from the defense side
Hopefully we can attract these types down the line. I'd love to see more grey/blackhat discussion around the site.