this post was submitted on 29 Jun 2024
179 points (97.9% liked)

interestingasfuck

1264 readers
1 users here now

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] jet@hackertalks.com 13 points 3 months ago (1 children)

Surprised they use real phones for this, I would think VMs and VPNs would be the most scalable.

[โ€“] cmhe@lemmy.world 10 points 3 months ago

Since their usage is probably forbidden my the TOS of the platforms they use, and the platforms will try to detect this kind of usage and ban users, I would assume that the closer they appear like natural usage, the more effective they are.

Running these apps on a emulator and using VPNs etc. will probably be a red flag.