#blocklists

Fedizen ⁂ Fediverse Newsfedizen
2025-06-24

The Fediverse, a network of independently run servers using the ActivityPub protocol, is by .

🚧 These , often based on imported , create and hinder message threads.

🏔️ While is a goal, the Fediverse’s current state, with heavy-handed and , undermines this principle.

👉 battlepenguin.com/tech/the-bro

2025-06-19

💭 What if 50% of the malicious IPs you block aren’t even on the radar of 89 out of 92 top threat intel vendors?

That’s exactly what #CrowdSec delivers.

🛡️ Powered by a global community analyzing live attacks, 50% of our malicious IPs are unique. Get visibility others don’t have.

👉 crowdsec.net/blocklists

#cybersecurity #blocklists #cyberthreatintelligence

2025-06-17

16% of proven-aggressive IPs CrowdSec blocks are still unknown to other vendors for 15 to 20 days. 👀

🗓️ That’s over two weeks where you’re protected while others remain exposed.

How do we do it?
#CrowdSec leverages a #collaborative network of thousands of contributors worldwide, enabling us to detect and block malicious behavior before it becomes common knowledge.

Learn more 👉 crowdsec.net/blocklists

#cybersecurity #blocklists #cyberthreatintelligence

Peter N. M. Hansteenpitrh
2025-06-08

Should I Stop Caring and Let IP Address Reputation Sort Them Out? nxdomain.no/~peter/should_i_st

How long does data on misbehaving hosts on the Internet stay relevant in an IP Address Reputation context?

Link to poll within (on for a week, 4 days left, please *do* vote).

(repost for the CET-ish crowd, some still in holiday mode, and with graphics of sorts added)

KING CONSULT | Kommunikationkingconsult@berlin.social
2025-05-26

> [C]ommunity boundary #blocklists [have] incited conflict on the #Fediverse, with many users left cut off from their communities …. Using … #GroundedTheory, we interviewed 9 Fediverse users, including a mix of community boundary blocklist curators, server staff, and regular users, to determine key tensions between community moderation and mutual aid practices

2 May 2025, #openaccess: dl.acm.org/doi/10.1145/3710919
Erika Melder, Ada Lerner, Michael Ann DeVito

#FediScience #FediResearch #moderation

2025-05-02

AI Crawlers stealing your content? Time to fight back! 💪

LLMs and AI bots are scraping the web, stealing up your data, hogging bandwidth, and even crashing servers under aggressive loads.

Don’t let them freeload! The CrowdSec AI Crawlers Blocklist stops unwanted harvesting before it hurts your site’s performance or privacy.

Regain control over your digital assets: crowdsec.net/blog/protect-agai

#AIcrawlers #blocklists #threatintelligence #cybersecurity #infosec #AIbots #dataprotection

2025-04-29

Region Östergötland safeguards healthcare for 500,000 residents with the CrowdSec Blocklists. 🛡️

🇸🇪 As Sweden’s leading healthcare provider, Region Östergötland faces relentless cyber threats targeting critical infrastructure, including 3 data centers and 1,500 servers. Traditional measures like geo-blocking and free IP blocklists weren’t enough to keep up with evolving attacks.

Since deploying the CrowdSec Threat Intelligence Blocklist in February 2025, the results have been staggering:
• 215 million malicious IPs blocked in just weeks
• 6 million attacks stopped within the first 2 hours of deployment
• Improved firewall performance by filtering malicious traffic early

Discover how CrowdSec secures vital healthcare systems in our latest success story: crowdsec.net/blog/region-oster

#successsotry #threatintelligence #blocklists #healthcare #infosec

Region Östergötland safeguards healthcare for 500,000 residents with the CrowdSec Blocklists.
2025-04-28

When someone says "We are going to block instance A, you too should defederate them and dissociate. If you are a user on that instance, leave immediately or else you too will be isolated", please remember to ask for reasons, evidence and factual substantiation. Also make sure you search the fediverse using your own search facility and other tools and see if you can find the chain of events that lead to the present situation. This will take time. But make sure you do this. This is specially important if you are an admin of an instance; if you are in charge of other people's accounts. In that case you are taking decisions that will impact on other people's freedoms and experience.

#fediverse #blocklists #defederation

2025-04-24

AI.Robots.txt
Community-maintained list of AI crawlers including robots.txt rules to *tell* them not to crawl your site, and htaccess and Nginx rules to actually *block* them.
See also Dark Visitors. Found via GoToSocial docs.

#robots #hoot #web #AI #blocklists

2025-04-04

Why Italy’s #Piracy Shield risks moving from tiresome digital farce to serious national tragedy – Walled Culture

#Blocklists are drawn up by #copyright companies, without any review, or the possibility of any objections, and those blocks must be enforced within 30 minutes. Needless to say, such a ham-fisted and biased approach to copyright infringement is already producing some horrendous blunders

walledculture.org/why-italys-p

2025-04-01
8Petros [$ rm -rv /capitalism/*]8petros@petroskowo.pl
2025-01-19
So, #FediAdmins, (especially those of #Friendica), what #blockLists do you use to block spammers and other evildoers?
I have just recovered from hosting suspension ater someone attacked someone (#AppAttack) through us.
Now, with regular nasty people I can deal manually (and it makes my day), but I need a good source of blocks for cyberscum.
Peter N. M. Hansteenpitrh
2025-01-18

Likely not blogworthy in itself, but aficionados will get a light chuckle from hearing that some scraping and massaging relevant logs had the number of imaginary friends at nxdomain.no/~peter/traplist.sh for our not-friends to play with roll past the one million mark in the early hours of today CET.

The recent update of nxdomain.no/~peter/harvesting_ has links to more info.

2025-01-14

@pitrh can I separate out the aspects? While I think they *should* publish their auto-expiration policies, they should also be allowed to decide whether something is for a fixed-length or indefinite timeframe (as long as that policy is published). This allows folks who use #blocklists to decide which they prefer.

2024-12-31
@Kevin Karhan :verified: To quote Arthur C. Clarke:
Any sufficiently advanced technology is indistinguishable from magic.

And for your average Musk escapees, Mastodon alone is more than sufficiently advanced. These people believe that there's some magic going on that makes their fully public posts private and secure regardless. They want perfect security, but with zero inconvenience, and they think Mastodon provides them with exactly this.

In fact, they expect Mastodon to be an absolutely perfectly safe haven, simply because it isn't a corporate silo. Little do they know how close to being a corporate silo Mastodon is, what with having a US-based company and a lighthouse instance that accounts for 22% of the whole Fediverse in terms of MAUs.

On top of that, more than half of all Mastodon users think the Fediverse is only Mastodon, and most of the rest can't imagine that anything in the Fediverse could possibly have features that Mastodon doesn't have. Not unless you slap them right into their faces like character limits over 500.

They cling hard to and rely on an imagination of the Fediverse that has never even been close to reality and never will.

As for The Bad Space, its blocklist looks like it's curated not by evidence, but by emotional triggers. Generally, some blocklists go so wild that you have to ask yourself whether the reason why nobody has tried to block out everything that isn't vanilla Mastodon is because that'd be too big an effort (two out of three Fediverse instances aren't Mastodon), or whether such people simply don't know how far the Fediverse extends beyond Mastodon, so they don't know what to block. I mean, there should be reasons enough to block everything that isn't Mastodon.

Blocklist import from other instances doesn't make things any better. Just like on all networks where everyone can run a server, the Fediverse, especially Mastodon, has got admins who really shouldn't run a server. It looks very tempting to pick blocklists by length rather than content, the longer, the more "secure", import a bunch of them, but not curate them because that'd be extra effort.

In this light, it's a good thing that Oliphant put the tier-1 to tier-3 blocklists onto the chopping block when switching from manual list curation to automated list aggregation a while ago. Especially tier 3 would have been easy to exploit with little to no curation, and there certainly were enough sufficiently paranoid Mastodon admins who'd subscribe to tier 3 without ever taking a single peek at the list.

Sometimes I feel like going to Mastodon's GitHub repository and submitting blocking or allowing entire Fediverse server applications by user agent, both for admins and for users, as a feature request, just to see what'll happen. Maybe dumbed down on the user side to a switch that blocks everything that isn't Mastodon. But maybe I should also mention that (streams) already has this feature on the admin side so that the Mastodon devs have to think up a way to sell this as invented by Mastodon.

#Long #LongPost #CWLong #CWLongPost #FediMeta #FediverseMeta #CWFediMeta #CWFediverseMeta #Fediverse #Mastodon #NotOnlyMastodon #FediverseIsNotMastodon #MastodonIsNotTheFediverse #Blocklist #Blocklists #BlocklistMeta #CWBlocklistMeta
Martin Hamiltonm@martinh.net
2024-12-28

Got a minute? #SearchClub would love to get your feedback on some potential "easy starter projects" to help reclaim search for the searcher - and any other ideas you'd like to share.

Check out the ChaosPad, and let us know what you think: pads.ccc.de/rNBu09Mr2M. Perhaps you'd like to get involved? Even better! :blobfoxhyper2:

#38C3 #CCC #Search #Discovery #SearchEngines #LLM #LLMs #GenAI #MushroomForaging #PizzaGlue #Mwmbl #SearXNG #Blocklists #uBlock #uBlockOrigin #uBlacklist

Kevin Karhan :verified:kkarhan@infosec.space
2024-12-22

@DeltaWye @SynAck @Kuniti_shino @ErikUden OFC that's the nature of most services tht are open t new users.

  • #Abuse being a statistical inevitability:

#Shitter (rather #Teitter before #Mus ruined it!) had #API #RateLimiting to make #Spamming less effective (255 Statuses per 24hrs) even back when #TweetDeck was a seperate company...

  • Making dynamical limits that instantly lockout i.e. brand new accounts sending the same.message to 10+ others as a DM within 48 hours of registration should act as a speed-bump to #Spammers.

It won't prevent it entirely but make it more cumbersome.

This prevents remediation and correction of #banlists & #blocklists, leaving a lot if domains burned forever as the only.options are "replace" and "merge" and the average #ActivityPub admin or even #User isn't going to learn or setup a #git!

  • which is frustrating as I maintain multiple blocklists to help cleaning up the mess.

I.e. there isn't really a good way to combat #Typosquatting-based #Phishing beyond banning.offending domains...

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst