Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"JS packers to obfuscate their code so that it's only loaded by real browsers"

this is probably not what's happening. more likely, it's obfuscated for other reasons. curl doesn't parse or execute javascript.



It actually is in the case I'm talking about. I'm talking about illegal websites where the only money generated is by advertisements on human eyeballs. They go way out of their way to make sure no scrapers/robots can see the videos on the page since it costs them money for bandwidth. In addition to referrer checking and captcha, they also have inline javascript that evals itself to un-obfuscate itself and load the video on the page so that if someone somehow beats the first two methods and loads it by a command line interface, they still don't get the URL to the video.


pretty cool, wasn't aware of this at all. thanks for the explanation. but even if it were unpacked, curl wouldn't execute it.


On the other hand, I've learned something new about the paranoia of people who don't actually work in web development.

Explains those NoScript people quite well.


What do you mean? Who in your scenario here doesn't actually work in web development?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: