while the most bare bones knocking implementation may be classed as obscurity, there's certainly plenty of implementations which i wouldn't class as obscurity.
People iterate through all the IPv4 addresses since there are only 4,294,967,296 possible addresses. There are 340,282,366,920,938,463,463,374,607,431,768,211,456 possible IPv6 addresses
i love your thinking!!
do you have a backup in case you accidentally find yourself locked out from an ipv4-only network?
your original post is sufficiently vague that tbh i don't blame people for assuming you were just bootlicking? [which probably says more about the state of the world than you as an individual, but honestly it's not clear what you're trying to say?]
we all know a random citizen/local business presenting an identical calibre of evidence of repeated crimes would be extremely unlikely to routinely receive this degree of resource allocation.
so if it's an idealised aspirational universal "order" you're talking about then obviously noone's buying it - and i don't think you are either. so what do you mean?
anyway as an 1800s fairy tale for children, imo i think it's fine to view it through the lens of whichever culture you want. the trouble imo begins when trying to ascribe something to the story which it certainly did not contain - even that is probably basically harmless if you're just confused or something, but it certainly becomes a problem when it's used to justify unfairly shitting on someone else for a slightly different yet completely harmless alternative depiction.
it's even worse than that cos the original text never said ariel's human version race, they just assumed it lol.
and before anyone says yes but its written by a dane, my response is yes but it's a fairy tale, anything is possible. why assume and then get angry based on your assumption?
well yeah most of its operating software was derived from opensource projects, but capitalists exploited those opensource project without giving much if anything back, so…
i especially appreciate your point about the full experience of the cliffhanger.
this episodic storytelling format is ingrained in us, possibly for a very long time, but at least since the printing press flourished and episodic publications became popular and the illiterate would gather round those who would read aloud the latest episodes as they came out.
then came radio and families would gather around the radio listen to the weekly shows and discuss the possible outcomes of the cliffhanger with their friends and workmates etc. it was already very well ingrained into our society and culture by the time we were experiencing it.
in some ways i do like not having to wait, but it certainly removes layers of the experience as you've articulated well.
a ridiculous number of arguments are because people misunderstand what they're actually arguing over.
it's crazy how helpful it can be to stop, and check what they meant before responding to it.
apart from the obvious benefits, it can also make a nice pause for everyone to calm just a little, and also shows you're making an effort to understand which can be helpful too.
were you talking also about poisoning the training data?
two distinct (but imo highly worthwhile) things
tar pits are a bit like turning the tap off (or to a useless trickle). fortunately it’s well understood how to do it efficiently and it’s difficult to counter.
poisoning is a whole other thing. i’d imagine if nothing comes out of the tap the poison is unlikely to prove effective. there could perhaps be some clever ways to combine poisoning with tarpits in series, but in general they’d be deployed separately or at least in parallel.
bear in mind to meaningfully deploy a tar pit against scrapers you usually need some permissions on the server, it may not help too much for this exact problem in the article (except for some short term fuckery perhaps). poisoning this problem otoh is probably important
anywhere shit gets cliquey it gets toxic real fast - and that goes for ANY and ALL organisations.
safe-space concepts often inherently deals with an "us/them" dichotomy, which is unfortunately fertile ground for things getting cliquey.
it's not that one must lead to the other, its just that the foundation is there so the risk is higher if it's not managed properly.
this is why safe-spaces need to be protected from within and without. regardless of whether you're in the clique or out of it, it hurts everyone in the end.
would you classify out of band whitelisting by IP (or other session characteristic[s]) as having no security merit whatsoever?
would you classify it as purely a decision regarding network congestion & optimisation?
you're ofc free to define these things however you wish, but in a form which is helpful to OP's question i'm not sure i follow you.