this post was submitted on 29 Jun 2024
179 points (97.9% liked)

interestingasfuck

1946 readers
1 users here now

Please go to !interestingshare@lemmy.zip

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] jet@hackertalks.com 13 points 11 months ago (1 children)

Surprised they use real phones for this, I would think VMs and VPNs would be the most scalable.

[โ€“] cmhe@lemmy.world 10 points 11 months ago

Since their usage is probably forbidden my the TOS of the platforms they use, and the platforms will try to detect this kind of usage and ban users, I would assume that the closer they appear like natural usage, the more effective they are.

Running these apps on a emulator and using VPNs etc. will probably be a red flag.